Windows Analysis Report
SecuriteInfo.com.Adware.005af3651.12124.22502.exe

Overview

General Information

Sample name: SecuriteInfo.com.Adware.005af3651.12124.22502.exe
Analysis ID: 1427002
MD5: 4c7fc3ea97b821d36545c3957b2d0da2
SHA1: fe1d2a4867e4ac58d7f06857c6d506b16879ee40
SHA256: 6de058a8f8cba3bcec77779e831796f64a46ebccecc4f01d22179e78b6f7ef2f
Tags: exe
Infos:

Detection

Score: 13
Range: 0 - 100
Whitelisted: false
Confidence: 40%

Signatures

Windows shortcut file (LNK) contains suspicious command line arguments
Drops PE files
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries keyboard layouts
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Registry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Local\Links\InstalledLinks.txt Jump to behavior
Source: unknown HTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox View IP Address: 34.117.186.192 34.117.186.192
Source: Joe Sandbox View IP Address: 34.117.186.192 34.117.186.192
Source: Joe Sandbox View JA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: unknown DNS query: name: ipinfo.io
Source: unknown DNS query: name: ipinfo.io
Source: global traffic HTTP traffic detected: GET /country HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: ipinfo.io
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /country HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: ipinfo.io
Source: unknown DNS traffic detected: queries for: ipinfo.io
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.1986661885.00000000023E0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.2119159015.000000000221A000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.1989715448.00000000031D0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116715289.000000000234C000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.dk-soft.org/
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.1987168138.00000000023E0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.1987558495.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000000.1988553315.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp.0.dr String found in binary or memory: http://www.innosetup.com/
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe String found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.1987168138.00000000023E0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.1987558495.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000000.1988553315.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp.0.dr String found in binary or memory: http://www.remobjects.com/ps
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.1986661885.00000000023E0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.2119159015.000000000222D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116510949.0000000003AB2000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.1989715448.00000000031D0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2117781167.000000000063A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116510949.0000000003A8C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116715289.000000000234C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116510949.0000000003AEC000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/country
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2117781167.000000000063A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/countryry
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.1986661885.00000000023E0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.2119159015.000000000222D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116510949.0000000003B08000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116510949.0000000003AB2000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.1989715448.00000000031D0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116510949.0000000003A8C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116715289.000000000234C000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://stvkr.com/click-
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.1986661885.00000000023E0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.2119159015.000000000222D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116510949.0000000003B08000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116510949.0000000003AB2000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.1989715448.00000000031D0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116510949.0000000003A8C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116715289.000000000234C000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://terra.im/gl/?cid=$
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116715289.0000000002374000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116715289.00000000023AB000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://terra.im/gl/?cid=&oid=$
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116715289.000000000236B000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=$
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116021399.00000000006CA000.00000004.00000020.00020000.00000000.sdmp, Atomic Heart.lnk.1.dr, Atomic Heart.lnk0.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=1115&v=6&utm_campaign=test&trash=
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116715289.000000000233E000.00000004.00001000.00020000.00000000.sdmp, Battle Teams.lnk0.1.dr, Battle Teams.lnk.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=1140&v=6&utm_campaign=test&trash=
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116715289.00000000022E6000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=1140&v=6&utm_campaign=testt
Source: Blood and Soul.lnk0.1.dr, Blood and Soul.lnk.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=171&v=6&utm_campaign=test&trash=
Source: War Thunder.lnk.1.dr, War Thunder.lnk0.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=1925&v=6&utm_campaign=test&trash=
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116021399.00000000006CA000.00000004.00000020.00020000.00000000.sdmp, World of Tanks.lnk0.1.dr, World of Tanks.lnk.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=19706&v=6&utm_campaign=test&trash=
Source: Warface.lnk.1.dr, Warface.lnk0.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=20935&v=6&utm_campaign=test&trash=
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116021399.00000000006CA000.00000004.00000020.00020000.00000000.sdmp, World of Warships.lnk.1.dr, World of Warships.lnk0.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=24766&v=6&utm_campaign=test&trash=
Source: Aliexpress.lnk0.1.dr, Aliexpress.lnk.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=27233&v=6&utm_campaign=test&trash=
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116021399.00000000006CA000.00000004.00000020.00020000.00000000.sdmp, ArcheAge.lnk.1.dr, ArcheAge.lnk0.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=29103&v=6&utm_campaign=test&trash=
Source: Crossout.lnk.1.dr, Crossout.lnk0.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=29150&v=6&utm_campaign=test&trash=
Source: Enlisted.lnk0.1.dr, Enlisted.lnk.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=34283&v=6&utm_campaign=test&trash=
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116021399.00000000006CA000.00000004.00000020.00020000.00000000.sdmp, Perfect World.lnk0.1.dr, Perfect World.lnk.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=3480053&v=6&utm_campaign=test&trash=
Source: Rail Nation.lnk.1.dr, Rail Nation.lnk0.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=6735&v=6&utm_campaign=test&trash=
Source: Lost Ark.lnk0.1.dr, Lost Ark.lnk.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=833&v=6&utm_campaign=test&trash=
Source: Caliber.lnk0.1.dr, Caliber.lnk.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=911&v=6&utm_campaign=test&trash=
Source: ???????? ??????? ???????.lnk0.1.dr, ???????? ??????? ???????.lnk.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=NgRKk7SD&v=6&utm_campaign=test&trash=
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000002.2118833941.00000000032CE000.00000004.00000020.00020000.00000000.sdmp, ???????? ?????? Steam.lnk.1.dr, ???????? ?????? Steam.lnk0.1.dr String found in binary or memory: https://yagoaway.ru/gl/?cid=&oid=dFjmQFjX&v=6&utm_campaign=test&trash=
Source: unknown Network traffic detected: HTTP traffic on port 49704 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49704
Source: unknown HTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.5:49704 version: TLS 1.2

System Summary

barindex
Source: World of Tanks.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=19706&v=6&utm_campaign=test&trash="
Source: World of Tanks.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=19706&v=6&utm_campaign=test&trash="
Source: World of Warships.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=24766&v=6&utm_campaign=test&trash="
Source: World of Warships.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=24766&v=6&utm_campaign=test&trash="
Source: Perfect World.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=3480053&v=6&utm_campaign=test&trash="
Source: Perfect World.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=3480053&v=6&utm_campaign=test&trash="
Source: ArcheAge.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=29103&v=6&utm_campaign=test&trash="
Source: ArcheAge.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=29103&v=6&utm_campaign=test&trash="
Source: Atomic Heart.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=1115&v=6&utm_campaign=test&trash="
Source: Atomic Heart.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=1115&v=6&utm_campaign=test&trash="
Source: Battle Teams.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=1140&v=6&utm_campaign=test&trash="
Source: Battle Teams.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=1140&v=6&utm_campaign=test&trash="
Source: Aliexpress.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=27233&v=6&utm_campaign=test&trash="
Source: Aliexpress.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=27233&v=6&utm_campaign=test&trash="
Source: Blood and Soul.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=171&v=6&utm_campaign=test&trash="
Source: Blood and Soul.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=171&v=6&utm_campaign=test&trash="
Source: Caliber.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=911&v=6&utm_campaign=test&trash="
Source: Caliber.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=911&v=6&utm_campaign=test&trash="
Source: Crossout.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=29150&v=6&utm_campaign=test&trash="
Source: Crossout.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=29150&v=6&utm_campaign=test&trash="
Source: Enlisted.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=34283&v=6&utm_campaign=test&trash="
Source: Enlisted.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=34283&v=6&utm_campaign=test&trash="
Source: Lost Ark.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=833&v=6&utm_campaign=test&trash="
Source: Lost Ark.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=833&v=6&utm_campaign=test&trash="
Source: ???????? ??????? ???????.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=NgRKk7SD&v=6&utm_campaign=test&trash="
Source: ???????? ??????? ???????.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=NgRKk7SD&v=6&utm_campaign=test&trash="
Source: Rail Nation.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=6735&v=6&utm_campaign=test&trash="
Source: Rail Nation.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=6735&v=6&utm_campaign=test&trash="
Source: ???????? ?????? Steam.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=dFjmQFjX&v=6&utm_campaign=test&trash="
Source: ???????? ?????? Steam.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=dFjmQFjX&v=6&utm_campaign=test&trash="
Source: War Thunder.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=1925&v=6&utm_campaign=test&trash="
Source: War Thunder.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=1925&v=6&utm_campaign=test&trash="
Source: Warface.lnk.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=20935&v=6&utm_campaign=test&trash="
Source: Warface.lnk0.1.dr LNK file: url,OpenURL "https://yagoaway.ru/gl/?cid=&oid=20935&v=6&utm_campaign=test&trash="
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp.0.dr Static PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp.0.dr Static PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.1987168138.0000000002503000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.Adware.005af3651.12124.22502.exe
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe, 00000000.00000003.1987558495.000000007FE3F000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.Adware.005af3651.12124.22502.exe
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engine Classification label: clean13.winEXE@3/77@1/1
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Local\Programs Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe File created: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganization Jump to behavior
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe String found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe File read: C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe "C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe Process created: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp "C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp" /SL5="$1044A,1938865,172032,C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe Process created: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp "C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp" /SL5="$1044A,1938865,172032,C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe" Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: msimg32.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: rstrtmgr.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: dwmapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: sfc.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: sfc_os.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: explorerframe.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: winhttpcom.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: webio.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: mlang.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32 Jump to behavior
Source: World of Tanks.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: World of Tanks.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: World of Warships.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: World of Warships.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: Perfect World.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: Perfect World.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: ArcheAge.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: ArcheAge.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: Atomic Heart.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: Atomic Heart.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: Battle Teams.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: Battle Teams.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: Aliexpress.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: Aliexpress.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: Blood and Soul.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: Blood and Soul.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: Caliber.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: Caliber.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: Crossout.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: Crossout.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: Enlisted.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: Enlisted.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: Lost Ark.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: Lost Ark.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: ???????? ??????? ???????.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: ???????? ??????? ???????.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: Rail Nation.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: Rail Nation.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: ???????? ?????? Steam.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: ???????? ?????? Steam.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: War Thunder.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: War Thunder.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: Warface.lnk.1.dr LNK file: ..\..\..\Windows\system32\rundll32.exe
Source: Warface.lnk0.1.dr LNK file: ..\..\..\..\..\..\..\Windows\system32\rundll32.exe
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwner Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Window found: window name: TMainForm Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Automated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Automated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Automated click: Install
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Registry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall Jump to behavior
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe Static file information: File size 2362910 > 1048576
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe File created: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Local\Temp\is-IH3VM.tmp\_isetup\_setup64.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Local\Links\InstalledLinks.txt Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Aliexpress.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Blood and Soul.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Caliber.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Crossout.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Enlisted.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Lost Ark.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\???????? ??????? ???????.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Rail Nation.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\???????? ?????? Steam.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\War Thunder.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Warface.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\World of Tanks.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\World of Warships.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Perfect World.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\ArcheAge.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Atomic Heart.lnk Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Battle Teams.lnk Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.005af3651.12124.22502.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-IH3VM.tmp\_isetup\_setup64.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp TID: 4524 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Key opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Key opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809 Jump to behavior
Source: SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2117406159.0000000000700000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116021399.00000000006E6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Adware.005af3651.12124.22502.tmp, 00000001.00000003.2116021399.00000000006BD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: C:\Users\user\AppData\Local\Temp\is-EHUNG.tmp\SecuriteInfo.com.Adware.005af3651.12124.22502.tmp Process information queried: ProcessInformation Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs