Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 19, 2023, 5:57 p.m. | June 19, 2023, 5:59 p.m. |
-
RedGiant Activation Service Unlocker 2023.2.1.exe "C:\Users\test22\AppData\Local\Temp\RedGiant Activation Service Unlocker 2023.2.1.exe"
2560-
RedGiant Activation Service Unlocker 2023.2.1.tmp "C:\Users\test22\AppData\Local\Temp\is-DEA6T.tmp\RedGiant Activation Service Unlocker 2023.2.1.tmp" /SL5="$80178,4765645,800256,C:\Users\test22\AppData\Local\Temp\RedGiant Activation Service Unlocker 2023.2.1.exe"
2636-
-
net1.exe C:\Windows\system32\net1 stop "Red Giant Service"
2816
-
-
timeout.exe "timeout" /T 1 /NOBREAK
2860 -
-
net1.exe C:\Windows\system32\net1 stop mxredirect
2980
-
-
taskkill.exe "C:\Windows\system32\taskkill.exe" /f /im "RGContentService.exe"
3024 -
taskkill.exe "C:\Windows\system32\taskkill.exe" /f /im "MxNotify.exe"
800 -
-
deep.tmp "C:\Users\test22\AppData\Local\Temp\is-LU16A.tmp\deep.tmp" /SL5="$601E0,3608202,800256,C:\Users\test22\AppData\Local\Temp\is-V66SG.tmp\deep.exe" /verysilent
2236-
taskkill.exe "C:\Windows\system32\taskkill.exe" /f /im maxon.exe
2312
-
-
-
-
net1.exe C:\Windows\system32\net1 start "Red Giant Service"
2668
-
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1452
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
file | C:\Program Files (x86)\Google\Chrome\Application\chrome.exe |
file | c:\program files\mozilla firefox\firefox.exe |
section | .itext |
section | .didata |
file | C:\Users\test22\AppData\Local\Temp\is-V66SG.tmp\_isetup\_iscrypt.dll |
file | C:\Users\test22\AppData\Local\Temp\is-S19HO.tmp\_isetup\_iscrypt.dll |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows Explorer.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Snipping Tool.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Welcome Center.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows Fax and Scan.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Chrome.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Firefox.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Calculator.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Paint.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\displayswitch.lnk |
file | C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Sticky Notes.lnk |
file | C:\ProgramData\Microsoft\Windows\Start Menu\Programs\XPS Viewer.lnk |
file | C:\Users\test22\AppData\Local\Temp\is-V66SG.tmp\deep.exe |
file | C:\Users\test22\AppData\Local\Temp\is-LU16A.tmp\deep.tmp |
file | C:\Users\test22\AppData\Local\Temp\is-S19HO.tmp\_isetup\_iscrypt.dll |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "MxNotify.exe") |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "RGContentService.exe") |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "maxon.exe") |
Bkav | W32.AIDetectMalware |
Trapmine | malicious.high.ml.score |
cmdline | "C:\Windows\system32\net.exe" stop "Red Giant Service" |
cmdline | "C:\Windows\system32\net.exe" stop mxredirect |
cmdline | "C:\Windows\system32\taskkill.exe" /f /im "MxNotify.exe" |
cmdline | "C:\Windows\system32\taskkill.exe" /f /im "RGContentService.exe" |
cmdline | "C:\Windows\system32\net.exe" start "Red Giant Service" |
cmdline | "C:\Windows\system32\taskkill.exe" /f /im maxon.exe |