EoRezo
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 1,212 |
| Threat Level: | 20 % (Normal) |
| Infected Computers: | 1,617,318 |
| First Seen: | April 28, 2010 |
| Last Seen: | February 6, 2026 |
| OS(es) Affected: | Windows |
Microsoft has classified EoRezo as an adware infection. This Browser Helper Object (a kind of browser add-on for Internet Explorer) is disguised as a beneficial application that claims to connect you with interesting a useful content. However, EoRezo's main purpose is to spam its victims with constant, annoying, pop-up advertisements. EoRezo also engages in other practices that have been linked to malware infections rather than to legitimate Windows applications. Despite EoRezo's claim that EoRezo is interactive and designed to lead you to the content targeted to your own preferences, EoRezo simply displays advertisements from a predefined list (most probably of websites and services that have payed for EoRezo's services in one way or another). According to ESG PC security researchers, EoRezo does not seem to contain any redeeming features. A careful look at this browser toolbar reveals that EoRezo is simply one more advertising tool, designed to infringe on your privacy and force you to view a variety of advertisements (generating revenue illegally in the process). Since EoRezo makes changes to the Windows Registry and to your system settings, removing EoRezo will necessarily involve using a reliable, fully-updated anti-malware application.
Table of Contents
How EoRezo Can Affect Your Computer System
There are several things on EoRezo that have convinced malware analysts to regard EoRezo as a malware infection rather than a legitimate content-delivery system (such as StumbleUpon or the Reddit toolbar). Below, ESG PC security researchers have listed five ways in which EoRezo affects your computer system:
- EoRezo can connect to another server, in order to download its configuration files. This connection may happen without the user's authorization.
- This remote connection is a two-way street. EoRezo can send out information about your browsing habits and online activity to a remote server.
- EoRezo changes your home page settings and default search engine. This change can occur both on Internet Explorer and Mozilla Firefox (the two most popular Internet browsers).
- EoRezo connects to remote servers such as eorezo.com and alpha00001.com.
- EoRezo displays a constant barrage of advertisements in the form of annoying pop-up windows.
Aliases
15 security vendors flagged this file as malicious.
| Antivirus Vendor | Detection |
|---|---|
| Panda | Adware/BHO |
| AntiVir | Adware/EoRezo.A.72 |
| BitDefender | Application.Generic.384998 |
| Avast | Win32:Eorezo-B [PUP] |
| AVG | Generic5.GFU |
| Ikarus | Win32.Malware |
| Microsoft | Adware:Win32/EoRezo |
| AntiVir | Adware/EoRezo.N.2 |
| McAfee | Artemis!45CF2095378A |
| AntiVir | TR/Agent.974848.7 |
| McAfee | Artemis!06D4FED19763 |
| AVG | Generic4.BZWZ |
| Sophos | Eorezo |
| AntiVir | Adware/EoRezo.E.9 |
| Comodo | UnclassifiedMalware |
SpyHunter Detects & Remove EoRezo
File System Details
| # | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
|---|---|---|---|
| 1. | bSeeG8Dtsj.exe | 2b5765fa33cdf900c1fe19ad9e38a91a | 2,016 |
| 2. | da2-y93atm.exe | 68518535700af96f78aab5ba356eb6be | 929 |
| 3. | c9-08bX_Uq.exe | acb795c9a587100bbe9daf9b3de86fbe | 699 |
| 4. | LlrU&JD3QD.exe | 89052d3fa007d7ac9bac7d2f794ffa46 | 681 |
| 5. | 404wfJSXFb.exe | dd0d67502265c9b55183dd0257489b19 | 619 |
| 6. | Yq5gPZjCvX.exe | 98b9644afd4de7674189556ca819b8e1 | 357 |
| 7. | DTHLjesd0y.exe | b88955cbf36ca817df7ab5d64415b056 | 344 |
| 8. | 4571303.exe | 44032440596aa42cbb4bae2ff902b25b | 343 |
| 9. | 2Vi3oO42mK.exe | 6ced69cedb214f99015dc43a008e399f | 272 |
| 10. | trz6CF8.tmp | c47c904c27b70bce5f4ca0a4d97ff659 | 266 |
| 11. | &p#oqrzfgf.exe | 205d9b12e59328c8e57ac92aa16ee3f8 | 187 |
| 12. | LYFP.exe | b70ba5c079f815e03a95e004723404ad | 172 |
| 13. | qV65-8lNN-.exe | ba4fc752a7d74b9a67b7f6a1a8075660 | 154 |
| 14. | 2brkriuga_.exe | e280f49856c7cb7dd7de659742957ecd | 138 |
| 15. | owajxdaa'o.exe | 5003ed514dae595cf15c0b68af607b62 | 86 |
| 16. | j_&6_0k4jP.exe | 1800c30708a43555338cfadda8cff829 | 72 |
| 17. | z79hbçt-s#.exe | 190f8a1dc601f30ad7e3768fbcf8ea6e | 14 |
| 18. | 714338509.exe | f56bcfa60e398b14e1b746e68b9329e6 | 13 |
| 19. | 710282148.exe | f47425b1b9b9e6b8da09110c404858ae | 6 |
| 20. | 550802537.exe | 5589be52bae041ddad72cc24e0845d08 | 6 |
| 21. | 516459642.exe | dd6c5e4a7cad80c8b4949f4d13952359 | 4 |
| 22. | 247435605.exe | 1179589e86eb3a7e03b6c89e2586ebfb | 4 |
| 23. | 582164585.exe | b53bdabd915570eeb2f60a86761240f9 | 3 |
| 24. | 458222505.exe | 89b78aa279c12d96f31e3bddbd9740ac | 3 |
| 25. |
C:\Documents and Settings\ |
||
| 26. | C:\Program Files\eoRezo\EoEngine.exe | ||
| 27. | C:\Program Files\eoRezo\eoRezo.exe |
Registry Details
Directories
EoRezo may create the following directory or directories:
| %ALLUSERSPROFILE%\AppApcVerifier |
| %ALLUSERSPROFILE%\Application Data\AppApcVerifier |
| %APPDATA%\EoRezo |
| %APPDATA%\lighteningplayer |
| %LOCALAPPDATA%\combroadcaster |
| %PROGRAMFILES%\Ajc |
| %PROGRAMFILES%\BeCleaner |
| %PROGRAMFILES%\Caster |
| %PROGRAMFILES%\ComoBo |
| %PROGRAMFILES%\EoRezo |
| %PROGRAMFILES%\KokoMoss |
| %PROGRAMFILES%\Koruko |
| %PROGRAMFILES%\LighteningPlayer |
| %PROGRAMFILES%\Speedycar |
| %PROGRAMFILES%\WeatherInspect |
| %PROGRAMFILES%\WinCaster |
| %PROGRAMFILES%\YEha |
| %PROGRAMFILES%\bestDownloader |
| %PROGRAMFILES%\browseextension |
| %PROGRAMFILES%\comoBoss |
| %PROGRAMFILES%\documentss |
| %PROGRAMFILES%\elansurfer |
| %PROGRAMFILES%\lightcleaner |
| %PROGRAMFILES%\texttotalk |
| %PROGRAMFILES%\tuto100_ar_21 |
| %PROGRAMFILES(X86)%\Caster |
| %PROGRAMFILES(x86)%\Ajc |
| %PROGRAMFILES(x86)%\BeCleaner |
| %PROGRAMFILES(x86)%\ComoBo |
| %PROGRAMFILES(x86)%\EoRezo |
| %PROGRAMFILES(x86)%\KokoMoss |
| %PROGRAMFILES(x86)%\Koruko |
| %PROGRAMFILES(x86)%\LighteningPlayer |
| %PROGRAMFILES(x86)%\Parklands |
| %PROGRAMFILES(x86)%\Speedycar |
| %PROGRAMFILES(x86)%\WeatherInspect |
| %PROGRAMFILES(x86)%\WinCaster |
| %PROGRAMFILES(x86)%\YEha |
| %PROGRAMFILES(x86)%\bestDownloader |
| %PROGRAMFILES(x86)%\browseextension |
| %PROGRAMFILES(x86)%\comoBoss |
| %PROGRAMFILES(x86)%\documentss |
| %PROGRAMFILES(x86)%\elansurfer |
| %PROGRAMFILES(x86)%\lightcleaner |
| %PROGRAMFILES(x86)%\texttotalk |
| %PROGRAMFILES(x86)%\tuto100_ar_21 |
| %TEMP%\bestDownloader |
| %UserProfile%\Local Settings\Application Data\combroadcaster |
Analysis Report
General information
| Family Name: | Adware.eoRezo |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
b4452e060f29f9979c28f112ad79db19
SHA1:
061256a66b79ac9622e5dfa5e48bcdeac8c3dca8
File Size:
30.92 KB, 30920 bytes
|
|
MD5:
619912c8b4de42d7e88208e62363587c
SHA1:
58b272b4e1bf6c5d3b148bff61ee643b1ee084ce
File Size:
7.41 MB, 7410740 bytes
|
|
MD5:
baaaecd3b4cb3dafec6e3e65b5001e3f
SHA1:
ec226d4e3673a84e7167f5018e1b41270067184b
SHA256:
46E13EA71E2DBA5F655BA925C0BF59EA2CA986A312C1D2DEF97F135AAE4D2544
File Size:
220.16 KB, 220160 bytes
|
|
MD5:
22c9362220256f18b3bc92080c9c5d2a
SHA1:
90dd677915cbc6d58b17035c3305858024200323
SHA256:
EB17C653F5217599527B7EA01E477F5224786A24B1EDCA0A620331CC9A262DB1
File Size:
161.79 KB, 161792 bytes
|
|
MD5:
4bf4a1a24674b6785cdfce70d4c09627
SHA1:
48b1853382eda339fdb0a0ceb6dc50af38761ab1
SHA256:
CB41FC3F618259D8B9734BD068F5238F532C0D5D108C29A65C400E4CD309D367
File Size:
3.27 MB, 3272080 bytes
|
Show More
|
MD5:
382262f03a1868e55c3d5887cbaedee7
SHA1:
bbe4e5835da701ccc98f66fe8bed3c00a07531ff
SHA256:
7170A58B395EB67BFB657E3B3F2D68D523BBF45D3F5D567FB65DC4479159148C
File Size:
6.39 MB, 6392163 bytes
|
|
MD5:
3b4558f8ddb168c1814ce60abe93ef55
SHA1:
5118ff18090d14b71307186e646aa0fa0b871faf
SHA256:
030EB7DD103DF757B651D88DDB54ED441070F1767044C7F8863416FFD259D9A6
File Size:
4.81 MB, 4810737 bytes
|
|
MD5:
027a8f08e292cb34d72e051b5e59bbe9
SHA1:
7f755a8ac6be709ee43c70fca6a31fa42c3139f4
SHA256:
C28386E07A6BD12C4D6875FA027D7BF2457F8CB40424DB7B56BCBB43505B634D
File Size:
3.69 MB, 3690680 bytes
|
|
MD5:
56bd6fd4c318ab7f3a53028833898928
SHA1:
799d32d7aa589beb35cfa26620ca91b0db5ca768
SHA256:
74E06A558B533303670D2CBDC9249A8DD9E8065194762D9EDD73FA6DFD61C431
File Size:
3.32 MB, 3317728 bytes
|
|
MD5:
16df802e0306f46a332326ef8ee2154d
SHA1:
3e8540aab00a66431c0d4dca81d7471459709980
SHA256:
6A1F9DD602AC7FF809EAE6E3A2A3A8C1396E1C53C44FBAA3AF6E0E06832F4360
File Size:
26.11 KB, 26112 bytes
|
|
MD5:
19c3cfd1637b22f7106268007e05346c
SHA1:
98d78c68af2ff194eff8c948fdbc997afe7e4890
SHA256:
5AE1594119984CC0821C71B2D7C7A4015CF2EA7B34798E51D09ECBFD3E30C97D
File Size:
3.98 MB, 3981456 bytes
|
|
MD5:
1b5894ffbb972ad3a3e6b5c82efebbfa
SHA1:
97f8e593932874420b0c30fc5ed9b827d4ef2798
SHA256:
38CDE2AF66BC2BDA57C09957F6F88EDE3B7615CEA4D8852CF1019DC4F21F727C
File Size:
7.07 MB, 7069640 bytes
|
|
MD5:
8960b74f61505489f73b6f9f8d23804d
SHA1:
f9fa5de637ba7f8a99af6d5f87e3bb93151118c9
SHA256:
E849418867F727F1D271A9A000AE465398CDB1E2273B7D0F0BEF734225EDDD2A
File Size:
489.52 KB, 489518 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has TLS information
- File is .NET application
- File is 32-bit executable
- File is 64-bit executable
- File is either console or GUI application
Show More
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version |
|
| Comments |
|
| Company Name |
|
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| TUTO4PC COM INTERNATIONAL SL | GlobalSign CodeSigning CA - G2 | Self Signed |
| CONCEPTION SELECTION DISTRIBUTION INTERNATIONALE | GlobalSign CodeSigning CA - SHA256 - G2 | Hash Mismatch |
| CONCEPTION SELECTION DISTRIBUTION INTERNATIONALE | GlobalSign CodeSigning CA - SHA256 - G2 | Self Signed |
| L Agence Exclusive | GlobalSign CodeSigning CA - SHA256 - G2 | Self Signed |
| TUTO4PC COM INTERNATIONAL SL | GlobalSign CodeSigning CA - SHA256 - G2 | Self Signed |
File Traits
- .NET
- big overlay
- HighEntropy
- Inno
- InnoSetup Installer
- Installer Manifest
- Installer Version
- No Version Info
- RijndaelManaged
- x64
Show More
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 565 |
|---|---|
| Potentially Malicious Blocks: | 25 |
| Whitelisted Blocks: | 240 |
| Unknown Blocks: | 300 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Eorezo.A
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe\gmdasllogger | Generic Write,Read Attributes |
| c:\users\user\appdata\local\rec_pl_69\rec_pl_69\1.20\cnf.cyl | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\is-9p6tn.tmp\is-qj36v.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-q0b38.tmp\_isetup\_iscrypt.dll | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\is-q0b38.tmp\_isetup\_setup64.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\is-q0b38.tmp\_isetup\_shfoldr.dll | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\is-qsgbk.tmp\7f755a8ac6be709ee43c70fca6a31fa42c3139f4_0003690680.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-tpnsh.tmp\48b1853382eda339fdb0a0ceb6dc50af38761ab1_0003272080.tmp | Generic Write,Read Attributes |
| c:\windows\appcompat\programs\amcache.hve | Read Data,Read Control,Write Data |
| c:\windows\appcompat\programs\amcache.hve | Write Attributes |
Show More
| c:\windows\appcompat\programs\amcache.hve.log1 | Read Data,Write Data |
| c:\windows\appcompat\programs\amcache.hve.log2 | Read Data,Write Data |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ffi倕懂ǜ | RegNtPreCreateKey |
| HKLM\software\classes\jscript:: | JScript Language | RegNtPreCreateKey |
| HKLM\software\classes\jscript\clsid:: | {f414c260-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\livescript:: | JScript Language | RegNtPreCreateKey |
| HKLM\software\classes\livescript\clsid:: | {f414c260-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\javascript:: | JScript Language | RegNtPreCreateKey |
| HKLM\software\classes\javascript\clsid:: | {f414c260-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\javascript1.1:: | JScript Language | RegNtPreCreateKey |
| HKLM\software\classes\javascript1.1\clsid:: | {f414c260-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\javascript1.2:: | JScript Language | RegNtPreCreateKey |
Show More
| HKLM\software\classes\javascript1.2\clsid:: | {f414c260-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\javascript1.3:: | JScript Language | RegNtPreCreateKey |
| HKLM\software\classes\javascript1.3\clsid:: | {f414c260-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\ecmascript:: | JScript Language | RegNtPreCreateKey |
| HKLM\software\classes\ecmascript\clsid:: | {f414c260-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}:: | JScript Language | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\progid:: | JScript | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\inprocserver32:: | C:\WINDOWS\SysWow64\jscript.dll | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\inprocserver32::threadingmodel | Both | RegNtPreCreateKey |
| HKLM\software\classes\jscript author:: | JScript Language Authoring | RegNtPreCreateKey |
| HKLM\software\classes\jscript author\clsid:: | {f414c261-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\jscript.compact author:: | JScript Language Authoring | RegNtPreCreateKey |
| HKLM\software\classes\jscript.compact author\clsid:: | {f414c261-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\livescript author:: | JScript Language Authoring | RegNtPreCreateKey |
| HKLM\software\classes\livescript author\clsid:: | {f414c261-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\javascript author:: | JScript Language Authoring | RegNtPreCreateKey |
| HKLM\software\classes\javascript author\clsid:: | {f414c261-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\javascript1.1 author:: | JScript Language Authoring | RegNtPreCreateKey |
| HKLM\software\classes\javascript1.1 author\clsid:: | {f414c261-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\javascript1.2 authorjavascript1.3 author:: | JScript Language Authoring | RegNtPreCreateKey |
| HKLM\software\classes\javascript1.2 authorjavascript1.3 author\clsid:: | {f414c261-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\ecmascript author:: | JScript Language Authoring | RegNtPreCreateKey |
| HKLM\software\classes\ecmascript author\clsid:: | {f414c261-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}:: | JScript Language Authoring | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}\progid:: | JScript Author | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}\inprocserver32:: | C:\WINDOWS\SysWow64\jscript.dll | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}\inprocserver32::threadingmodel | Both | RegNtPreCreateKey |
| HKLM\software\classes\jscript.encode:: | JScript Language Encoding | RegNtPreCreateKey |
| HKLM\software\classes\jscript.encode\clsid:: | {f414c262-6ac0-11cf-b6d1-00aa00bbbb58} | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}:: | JScript Language Encoding | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\progid:: | JScript.Encode | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\inprocserver32:: | C:\WINDOWS\SysWow64\jscript.dll | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\inprocserver32::threadingmodel | Both | RegNtPreCreateKey |
| HKLM\software\classes\jscript.compact:: | JScript Compact Profile (ECMA 327) | RegNtPreCreateKey |
| HKLM\software\classes\jscript.compact\clsid:: | {cc5bbec3-db4a-4bed-828d-08d78ee3e1ed} | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}:: | JScript Compact Profile (ECMA 327) | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}\progid:: | JScript.Compact | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}\inprocserver32:: | C:\WINDOWS\SysWow64\jscript.dll | RegNtPreCreateKey |
| HKLM\software\classes\wow6432node\clsid\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}\inprocserver32::threadingmodel | Both | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\software\microsoft\tip\aggregateresults::data | 鐄ȴ 鲱 講 洎ʫጉ嵑 詛 픋˹耀뫹躧 隞̃☁耀꧌ ì č | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Process Shell Execute |
|
| User Data Access |
|
| Process Manipulation Evasion |
|
| Syscall Use |
Show More
13 additional items are not displayed above. |
| Anti Debug |
|
| Encryption Used |
|
| Keyboard Access |
|
| Other Suspicious |
|
| Process Terminate |
|
| Network Winsock2 |
|
| Network Winsock |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\system32\fondue.exe "C:\WINDOWS\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll
|
"C:\Users\Walihcyy\AppData\Local\Temp\is-9P6TN.tmp\is-QJ36V.tmp" /SL4 $201EA "c:\users\user\downloads\58b272b4e1bf6c5d3b148bff61ee643b1ee084ce_0007410740.exe" 7157536 52736
|
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\\dw20.exe dw20.exe -x -s 744
|
"C:\Users\Opgkgfrd\AppData\Local\Temp\is-TPNSH.tmp\48b1853382eda339fdb0a0ceb6dc50af38761ab1_0003272080.tmp" /SL5="$40218,2997737,56832,c:\users\user\downloads\48b1853382eda339fdb0a0ceb6dc50af38761ab1_0003272080"
|
"C:\Users\Bxqnfxyr\AppData\Local\Temp\is-QSGBK.tmp\7f755a8ac6be709ee43c70fca6a31fa42c3139f4_0003690680.tmp" /SL5="$F016A,3188624,221696,c:\users\user\downloads\7f755a8ac6be709ee43c70fca6a31fa42c3139f4_0003690680"
|
Show More
"C:\WINDOWS\system32\taskkill.exe" /f /im maxdu.exe
|
WriteConsole: ERROR: The proce
|
open taskkill.exe /f /im "maxdu.exe"
|
"C:\WINDOWS\system32\regsvr32.exe" /s "C:\WINDOWS\system32\jscript.dll"
|
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\\dw20.exe dw20.exe -x -s 756
|