File name:

Modifiedfluorosulfonic.exe

Full analysis: https://app.any.run/tasks/623486f1-27f7-4e5c-b3dd-74d5efd3d864
Verdict: Malicious activity
Analysis date: August 01, 2024, 01:31:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

C6E20E61971DBCC0698BD2EDBD2CCAC1

SHA1:

71E0FEA5452B2899E2AA48E125CE3E556A36396C

SHA256:

770F96B6B603F11CD3271E05B01393B9952CF80D6EDEA1E9ACB63E96EB848F0A

SSDEEP:

6144:t4ZIanUzmIALbkcJOrmcZVwc6Qyss72XJiWIzdzsE/ZrTrX:tiUEdJEmcoc64tZqzdZrTrX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Modifiedfluorosulfonic.exe (PID: 6584)
    • Disables the Run the Start menu

      • reg.exe (PID: 2268)
    • Disables the LogOff the Start menu

      • reg.exe (PID: 6204)
  • SUSPICIOUS

    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 7124)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 6292)
      • cmd.exe (PID: 3076)
      • cmd.exe (PID: 5888)
      • cmd.exe (PID: 6244)
      • cmd.exe (PID: 2584)
      • cmd.exe (PID: 6392)
    • Starts CMD.EXE for commands execution

      • Modifiedfluorosulfonic.exe (PID: 6584)
      • forfiles.exe (PID: 8868)
    • Reads security settings of Internet Explorer

      • Modifiedfluorosulfonic.exe (PID: 6584)
      • wmplayer.exe (PID: 8540)
      • FlashPlayerApp.exe (PID: 9204)
    • Reads the date of Windows installation

      • Modifiedfluorosulfonic.exe (PID: 6584)
      • wmplayer.exe (PID: 8540)
    • Uses ATTRIB.EXE to modify file attributes

      • Modifiedfluorosulfonic.exe (PID: 6584)
    • Creates file in the systems drive root

      • bootcfg.exe (PID: 4784)
    • Uses ICACLS.EXE to modify access control lists

      • Modifiedfluorosulfonic.exe (PID: 6584)
    • Executes as Windows Service

      • VSSVC.exe (PID: 2960)
      • vds.exe (PID: 7576)
      • msdtc.exe (PID: 8096)
      • dllhost.exe (PID: 1172)
    • Uses DRIVERQUERY.EXE to obtain a list of installed device drivers

      • Modifiedfluorosulfonic.exe (PID: 6584)
    • Using 'findstr.exe' to search for text patterns in files and output

      • Modifiedfluorosulfonic.exe (PID: 6584)
    • Searches and executes a command on selected files

      • forfiles.exe (PID: 8868)
    • Process uses IPCONFIG to get network configuration information

      • Modifiedfluorosulfonic.exe (PID: 6584)
    • Uses RUNDLL32.EXE to load library

      • iscsicpl.exe (PID: 6248)
    • Suspicious use of NETSH.EXE

      • Modifiedfluorosulfonic.exe (PID: 6584)
    • Uses powercfg.exe to modify the power settings

      • Modifiedfluorosulfonic.exe (PID: 6584)
    • Uses NSLOOKUP.EXE to check DNS info

      • Modifiedfluorosulfonic.exe (PID: 6584)
    • Application launched itself

      • OneDriveSetup.exe (PID: 8016)
    • Executable content was dropped or overwritten

      • OneDriveSetup.exe (PID: 10844)
    • Process drops legitimate windows executable

      • OneDriveSetup.exe (PID: 10844)
    • Start notepad (likely ransomware note)

      • Modifiedfluorosulfonic.exe (PID: 6584)
  • INFO

    • Reads the computer name

      • Modifiedfluorosulfonic.exe (PID: 6584)
      • agentactivationruntimestarter.exe (PID: 7084)
      • wmplayer.exe (PID: 8540)
      • setup_wm.exe (PID: 8596)
      • extrac32.exe (PID: 8876)
      • FlashPlayerApp.exe (PID: 9204)
    • Checks supported languages

      • Modifiedfluorosulfonic.exe (PID: 6584)
      • agentactivationruntimestarter.exe (PID: 7084)
      • appidtel.exe (PID: 6336)
      • curl.exe (PID: 5468)
      • wmplayer.exe (PID: 8540)
      • setup_wm.exe (PID: 8596)
      • extrac32.exe (PID: 8876)
      • expand.exe (PID: 5400)
      • FlashPlayerApp.exe (PID: 9204)
    • Process checks computer location settings

      • Modifiedfluorosulfonic.exe (PID: 6584)
      • wmplayer.exe (PID: 8540)
      • setup_wm.exe (PID: 8596)
    • Uses BITSADMIN.EXE

      • Modifiedfluorosulfonic.exe (PID: 6584)
    • Reads security settings of Internet Explorer

      • certreq.exe (PID: 6916)
      • calc.exe (PID: 2796)
      • OpenWith.exe (PID: 5056)
      • cleanmgr.exe (PID: 6376)
      • ComputerDefaults.exe (PID: 3844)
      • mmc.exe (PID: 6340)
      • DpiScaling.exe (PID: 7780)
      • explorer.exe (PID: 8064)
      • explorer.exe (PID: 7184)
      • unregmp2.exe (PID: 8620)
      • mmc.exe (PID: 8432)
      • mmc.exe (PID: 8492)
      • Magnify.exe (PID: 9508)
      • LaunchTM.exe (PID: 6860)
    • Reads Microsoft Office registry keys

      • ComputerDefaults.exe (PID: 3844)
      • explorer.exe (PID: 8064)
      • explorer.exe (PID: 7184)
    • Disables trace logs

      • cmdl32.exe (PID: 6868)
      • cmmon32.exe (PID: 6232)
      • cmstp.exe (PID: 4692)
      • dialer.exe (PID: 7308)
    • Create files in a temporary directory

      • ddodiag.exe (PID: 3684)
      • setup_wm.exe (PID: 8596)
    • Creates files in the program directory

      • mmc.exe (PID: 6340)
      • unregmp2.exe (PID: 8700)
      • mmc.exe (PID: 8492)
    • Checks transactions between databases Windows and Oracle

      • msdtc.exe (PID: 8096)
      • mmc.exe (PID: 6340)
      • dllhost.exe (PID: 1172)
    • Reads Environment values

      • setup_wm.exe (PID: 8596)
    • Creates files or folders in the user directory

      • unregmp2.exe (PID: 8700)
      • FlashPlayerApp.exe (PID: 9204)
    • Drops the executable file immediately after the start

      • OneDriveSetup.exe (PID: 10844)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:31 11:37:56+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 152064
InitializedDataSize: 432128
UninitializedDataSize: -
EntryPoint: 0xa38d
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 6.6.6.6
ProductVersionNumber: 6.6.6.6
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Process default
CharacterSet: Unicode
CompanyName: "NILL
FileDescription: NULL
FileVersion: NULL
InternalName: NULL
LegalCopyright: NULL
OriginalFileName: NULL
ProductName: NULL
ProductVersion: NULL
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
488
Monitored processes
335
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start modifiedfluorosulfonic.exe cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs agentactivationruntimestarter.exe no specs appidtel.exe no specs conhost.exe no specs arp.exe no specs conhost.exe no specs at.exe no specs conhost.exe no specs atbroker.exe no specs attrib.exe no specs conhost.exe no specs auditpol.exe no specs conhost.exe no specs autochk.exe no specs autoconv.exe no specs autofmt.exe no specs backgroundtaskhost.exe no specs backgroundtransferhost.exe no specs bitsadmin.exe no specs conhost.exe no specs bootcfg.exe no specs conhost.exe no specs bthudtask.exe no specs conhost.exe no specs bytecodegenerator.exe no specs conhost.exe no specs cacls.exe no specs conhost.exe no specs calc.exe no specs camerasettingsuihost.exe no specs openwith.exe no specs certenrollctrl.exe no specs certreq.exe no specs conhost.exe no specs certutil.exe no specs conhost.exe no specs charmap.exe no specs checknetisolation.exe no specs conhost.exe no specs chkdsk.exe no specs conhost.exe no specs chkntfs.exe no specs conhost.exe no specs vssvc.exe no specs choice.exe no specs conhost.exe no specs cipher.exe no specs conhost.exe no specs cleanmgr.exe no specs cliconfg.exe no specs clip.exe no specs conhost.exe no specs cloudnotifications.exe no specs cmd.exe no specs conhost.exe no specs cmdkey.exe no specs conhost.exe no specs cmdl32.exe no specs cmmon32.exe no specs cmstp.exe no specs colorcpl.exe no specs comp.exe no specs conhost.exe no specs compact.exe no specs conhost.exe no specs computerdefaults.exe no specs control.exe no specs convert.exe no specs explorer.exe no specs conhost.exe no specs credentialuibroker.exe no specs credwiz.exe no specs cscript.exe no specs conhost.exe no specs ctfmon.exe no specs COpenControlPanel no specs ctfmon.exe no specs cttune.exe no specs cttunesvr.exe no specs curl.exe no specs conhost.exe no specs dccw.exe no specs dcomcnfg.exe no specs mmc.exe ddodiag.exe no specs devicepairingwizard.exe no specs dfrgui.exe no specs dialer.exe no specs diskpart.exe no specs conhost.exe no specs vdsldr.exe no specs vds.exe no specs diskperf.exe no specs conhost.exe no specs dism.exe conhost.exe no specs dllhost.exe no specs dllhst3g.exe no specs doskey.exe no specs conhost.exe no specs dpapimig.exe no specs dllhost.exe no specs dpiscaling.exe no specs explorer.exe no specs explorer.exe no specs msdtc.exe no specs driverquery.exe no specs conhost.exe no specs dtdump.exe no specs conhost.exe no specs dvdplay.exe no specs wmplayer.exe no specs setup_wm.exe no specs unregmp2.exe no specs dwwin.exe no specs unregmp2.exe no specs dxdiag.exe no specs easeofaccessdialog.exe no specs easeofaccessdialog.exe no specs edpnotify.exe no specs efsui.exe no specs ehstorauthn.exe no specs esentutl.exe conhost.exe no specs eudcedit.exe no specs eventcreate.exe no specs conhost.exe no specs eventvwr.exe no specs mmc.exe mmc.exe expand.exe no specs conhost.exe no specs explorer.exe no specs extrac32.exe no specs fc.exe no specs conhost.exe no specs find.exe no specs conhost.exe no specs findstr.exe no specs conhost.exe no specs finger.exe no specs conhost.exe no specs fixmapi.exe no specs flashplayerapp.exe no specs fltmc.exe no specs conhost.exe no specs fondue.exe no specs fontdrvhost.exe no specs fontview.exe no specs forfiles.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs fsquirt.exe no specs fsutil.exe no specs conhost.exe no specs ftp.exe no specs conhost.exe no specs gamebarpresencewriter.exe no specs gamepanel.exe no specs getmac.exe no specs conhost.exe no specs gpresult.exe no specs conhost.exe no specs gpscript.exe no specs gpupdate.exe no specs conhost.exe no specs grpconv.exe no specs hdwwiz.exe no specs help.exe no specs conhost.exe no specs hh.exe no specs hostname.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icsunattend.exe no specs conhost.exe no specs ieunatt.exe no specs conhost.exe no specs iexpress.exe no specs infdefaultinstall.exe no specs inputswitchtoasthandler.exe no specs conhost.exe no specs instnm.exe no specs conhost.exe no specs ipconfig.exe no specs conhost.exe no specs iscsicli.exe no specs conhost.exe no specs iscsicpl.exe no specs rundll32.exe no specs isoburn.exe no specs ktmutil.exe no specs conhost.exe no specs label.exe no specs conhost.exe no specs launchtm.exe no specs taskmgr.exe no specs launchwinapp.exe no specs lodctr.exe no specs conhost.exe no specs logagent.exe no specs logman.exe no specs conhost.exe no specs magnify.exe no specs magnify.exe no specs makecab.exe no specs conhost.exe no specs mavinject.exe no specs mcbuilder.exe no specs conhost.exe no specs mfpmp.exe no specs mmc.exe no specs mmc.exe no specs mmgaserver.exe no specs mobsync.exe no specs mobsync.exe no specs mountvol.exe no specs conhost.exe no specs COpenControlPanel no specs mrinfo.exe no specs COpenControlPanel no specs conhost.exe no specs msdt.exe no specs msfeedssync.exe no specs UIAutomationCrossBitnessHook64 Class no specs mshta.exe no specs msiexec.exe no specs msinfo32.exe no specs mspaint.exe no specs msra.exe no specs msra.exe no specs mstsc.exe no specs mtstocom.exe no specs conhost.exe no specs msra.exe no specs muiunattend.exe no specs conhost.exe no specs ndadmin.exe no specs mstsc.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs conhost.exe no specs net1.exe no specs netbtugc.exe no specs conhost.exe no specs netcfgnotifyobjecthost.exe no specs netiougc.exe no specs conhost.exe no specs netplwiz.exe no specs netsh.exe no specs conhost.exe no specs netstat.exe no specs conhost.exe no specs newdev.exe no specs notepad.exe no specs nslookup.exe no specs conhost.exe no specs ntprint.exe no specs odbcad32.exe no specs odbcconf.exe no specs onedrivesetup.exe no specs openfiles.exe no specs conhost.exe no specs openwith.exe no specs oposhost.exe no specs packagedcwalauncher.exe no specs passwordonwakesettingflyout.exe no specs onedrivesetup.exe pathping.exe no specs conhost.exe no specs pcaui.exe no specs perfhost.exe no specs conhost.exe no specs perfmon.exe no specs mmc.exe no specs pickerhost.exe no specs ping.exe no specs conhost.exe no specs pkgmgr.exe no specs poqexec.exe no specs powercfg.exe no specs conhost.exe no specs presentationhost.exe no specs prevhost.exe no specs print.exe no specs conhost.exe no specs printui.exe no specs proquota.exe no specs provlaunch.exe no specs conhost.exe no specs psr.exe no specs psr.exe no specs quickassist.exe no specs quickassist.exe no specs rasautou.exe no specs conhost.exe no specs modifiedfluorosulfonic.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
32\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exechkdsk.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
644"C:\Windows\System32\CredentialUIBroker.exe" C:\Windows\SysWOW64\CredentialUIBroker.exeModifiedfluorosulfonic.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Credential Manager UI Host
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\credentialuibroker.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
840"C:\Windows\System32\cscript.exe" C:\Windows\SysWOW64\cscript.exeModifiedfluorosulfonic.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
872"C:\WINDOWS\SysWOW64\ctfmon.exe" C:\Windows\SysWOW64\ctfmon.exeModifiedfluorosulfonic.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
CTF Loader
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
944"C:\Windows\System32\PresentationHost.exe" C:\Windows\SysWOW64\PresentationHost.exeModifiedfluorosulfonic.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Presentation Foundation Host
Exit code:
1
Version:
4.0.41210.0 built by: Main
1076\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1136"C:\Windows\System32\powercfg.exe" C:\Windows\SysWOW64\powercfg.exeModifiedfluorosulfonic.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Power Settings Command-Line Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
1136\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerasautou.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
1152"C:\Windows\System32\ctfmon.exe" C:\Windows\SysWOW64\ctfmon.exeModifiedfluorosulfonic.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
CTF Loader
Exit code:
3221226540
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1172C:\WINDOWS\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}C:\Windows\System32\dllhost.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
COM Surrogate
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
Total events
59 973
Read events
59 663
Write events
303
Delete events
7

Modification events

(PID) Process:(5740) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system
Operation:writeName:DisableTaskMgr
Value:
1
(PID) Process:(2268) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Operation:writeName:NoRun
Value:
1
(PID) Process:(5540) reg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:HideFastUserSwitching
Value:
1
(PID) Process:(6204) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
Operation:writeName:NoLogoff
Value:
1
(PID) Process:(6380) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system
Operation:writeName:DisableLockWorkstation
Value:
1
(PID) Process:(6584) Modifiedfluorosulfonic.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system
Operation:writeName:DisableRegistryTools
Value:
1
(PID) Process:(6584) Modifiedfluorosulfonic.exeKey:HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System
Operation:writeName:DisableCMD
Value:
2
(PID) Process:(6584) Modifiedfluorosulfonic.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6584) Modifiedfluorosulfonic.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6584) Modifiedfluorosulfonic.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
Executable files
68
Suspicious files
20
Text files
48
Unknown types
1

Dropped files

PID
Process
Filename
Type
6376cleanmgr.exeC:\Windows\System32\LogFiles\setupcln\setupact.log
MD5:
SHA256:
7576vds.exe\Device\Harddisk0\DR0
MD5:
SHA256:
6376cleanmgr.exeC:\Windows\System32\LogFiles\setupcln\setuperr.logtext
MD5:72B0157C370C90DD955C7A980B69F890
SHA256:5CF4FE52B8E16E3507AB4C9C6FD5F3650044D0765EBFA71963853964912E6EF3
6376cleanmgr.exeC:\Users\admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.locktext
MD5:F49655F856ACB8884CC0ACE29216F511
SHA256:7852FCE59C67DDF1D6B8B997EAA1ADFAC004A9F3A91C37295DE9223674011FBA
6376cleanmgr.exeC:\Users\admin\AppData\Local\D3DSCache\d3fe7cdcb51a5ef5\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.locktext
MD5:F49655F856ACB8884CC0ACE29216F511
SHA256:7852FCE59C67DDF1D6B8B997EAA1ADFAC004A9F3A91C37295DE9223674011FBA
6376cleanmgr.exeC:\Windows\System32\LogFiles\setupcln\diagwrn.xmltext
MD5:E3BE7F81065AEA7BB1083575E20E4EB2
SHA256:3D37E117FB659278A3750C38CC6FFC48331B3034C0C1142C11AAEDA880AA7F17
6376cleanmgr.exeC:\Users\admin\AppData\Local\D3DSCache\3534848bb9f4cb71\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.locktext
MD5:F49655F856ACB8884CC0ACE29216F511
SHA256:7852FCE59C67DDF1D6B8B997EAA1ADFAC004A9F3A91C37295DE9223674011FBA
6376cleanmgr.exeC:\Users\admin\AppData\Local\D3DSCache\ecbf0d5a3a180bb\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.locktext
MD5:F49655F856ACB8884CC0ACE29216F511
SHA256:7852FCE59C67DDF1D6B8B997EAA1ADFAC004A9F3A91C37295DE9223674011FBA
7008colorcpl.exeC:\Windows\INF\display.PNFbinary
MD5:62887E3F2C67C748F05C629DB62182A4
SHA256:1B686CFC6E98A6034A28BA9BE22C190723467365477E75A18A78104A26554CE9
3684ddodiag.exeC:\Windows\INF\basicdisplay.PNFbinary
MD5:914DCB989709A0CE3F4B24A4CD147F1A
SHA256:C2FEE0EAD23C7B3B509FDDE94DDD6A549F999F364C5CA9D09AC084F22BC0ECB4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
20
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
404
95.100.146.34:443
https://www.bing.com/RelatedSearch?addfeaturesnoexpansion=relatedsearch&mkt=en-US
unknown
GET
404
184.30.129.84:443
https://cxcs.microsoft.net/api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&platform=desktop
unknown
html
26 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3888
svchost.exe
239.255.255.250:1900
whitelisted
1664
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3520
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1028
SystemSettings.exe
2.23.209.187:443
www.bing.com
Akamai International B.V.
GB
unknown
1028
SystemSettings.exe
184.30.129.84:443
cxcs.microsoft.net
AKAMAI-AS
US
unknown
7412
dasHost.exe
192.168.100.255:3289
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 142.250.186.174
whitelisted
www.bing.com
  • 2.23.209.187
  • 2.23.209.133
  • 2.23.209.130
  • 2.23.209.149
  • 2.23.209.182
whitelisted
cxcs.microsoft.net
  • 184.30.129.84
whitelisted
win1910.ipv6.microsoft.com
  • 40.74.3.100
whitelisted
5.6.5.f.e.b.3.d.f.9.3.e.d.f.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa
unknown
2.100.168.192.in-addr.arpa
whitelisted
4.b.7.8.3.9.8.0.6.f.6.5.7.d.8.8.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa
unknown
watson.events.data.microsoft.com
  • 52.168.117.173
whitelisted
pnrpv2.ipv6.microsoft.com
  • 2a01:111:f100:2004::8975:67d0
whitelisted

Threats

No threats detected
Process
Message
mmc.exe
ViewerConfigPath = 'C:\ProgramData\Microsoft\Event Viewer': Microsoft.Windows.ManagementUI.CombinedControls.EventsNode
mmc.exe
ViewerViewsFolderPath = 'C:\ProgramData\Microsoft\Event Viewer\Views': Microsoft.Windows.ManagementUI.CombinedControls.EventsNode
mmc.exe
ViewerAdminViewsPath = 'C:\ProgramData\Microsoft\Event Viewer\Views\ApplicationViewsRootNode': Microsoft.Windows.ManagementUI.CombinedControls.EventsNode
mmc.exe
ViewerExternalLogsPath = 'C:\ProgramData\Microsoft\Event Viewer\ExternalLogs': Microsoft.Windows.ManagementUI.CombinedControls.EventsNode
Dism.exe
PID=7752 TID=7756 Instantiating the Provider Store. - CDISMImageSession::get_ProviderStore
Dism.exe
PID=7752 TID=7756 Initializing a provider store for the LOCAL session type. - CDISMProviderStore::Final_OnConnect
Dism.exe
PID=7752 TID=7756 Attempting to initialize the logger from the Image Session. - CDISMProviderStore::Final_OnConnect
Dism.exe
PID=7752 TID=7756 Provider has not previously been encountered. Attempting to initialize the provider. - CDISMProviderStore::Internal_GetProvider
Dism.exe
PID=7752 TID=7756 Loading Provider from location C:\Windows\System32\Dism\LogProvider.dll - CDISMProviderStore::Internal_GetProvider
Dism.exe
PID=7752 TID=7756 Connecting to the provider located at C:\Windows\System32\Dism\LogProvider.dll. - CDISMProviderStore::Internal_LoadProvider