ad663e99a03cfeb390705402c361fe59b2d5e651


Zero‑Dwell Threat Intelligence Report

A narrative, executive‑ready view into the malware’s behavior, exposure, and reliable defenses.
Generated: 2025-09-16 10:41:26 UTC

Executive Overview — What We’re Dealing With

This specimen has persisted long enough to matter. Human experts classified it as Malware, and the telemetry confirms a capable, evasive Trojan with real impact potential.

File
cmsmpo10.exe
Type
Win32 Executable (generic)
SHA‑1
ad663e99a03cfeb390705402c361fe59b2d5e651
MD5
6bfca827beb056c5043d88bb74e06d37
First Seen
2025-09-05 07:17:39.842884
Last Analysis
2025-09-05 10:20:38.722534
Dwell Time
0 days, 7 hours, 33 minutes

Extended Dwell Time Impact

For 3+ hours, this malware remained undetected — a limited but sufficient window for the adversary to complete initial execution and establish basic system access.

Comparative Context

Industry studies report a median dwell time closer to 21–24 days. This case represents rapid detection and containment within hours rather than days.

Timeline

Time (UTC) Event Elapsed
2025-09-04 13:40:04 UTC First VirusTotal submission
2025-09-09 07:40:15 UTC Latest analysis snapshot 4 days, 18 hours, 0 minutes
2025-09-16 10:41:26 UTC Report generation time 11 days, 21 hours, 1 minutes

Why It Matters

Every additional day of dwell time is not just an abstract number — it is attacker opportunity. Each day equates to more time for lateral movement, stealth persistence, and intelligence gathering.

Global Detection Posture — Who Caught It, Who Missed It

VirusTotal engines: 73. Detected as malicious: 52. Missed: 21. Coverage: 71.2%.

Detected Vendors

  • Xcitium
  • +51 additional vendors (names not provided)

List includes Xcitium plus an additional 51 vendors per the provided summary.

Missed Vendors

  • Acronis
  • Antiy-AVL
  • Baidu
  • ClamAV
  • CMC
  • DrWeb
  • ESET-NOD32
  • Jiangmin
  • K7AntiVirus
  • K7GW
  • MaxSecure
  • NANO-Antivirus
  • SUPERAntiSpyware
  • TACHYON
  • VBA32
  • VirIT
  • ViRobot
  • Webroot
  • Zillya
  • ZoneAlarm
  • Zoner

Why it matters: if any endpoint relies solely on a missed engine, this malware can operate with zero alerts. Prevention‑first controls close that gap regardless of signature lag.

Behavioral Storyline — How the Malware Operates

The malware’s primary focus is on misc operations (54.92% of total behavior), suggesting specialized functionality targeting this system component.

Behavior Categories (weighted)

Weight values represent the frequency and intensity of malware interactions with specific system components. Higher weights indicate more aggressive targeting of that category. Each operation (registry access, file modification, network connection, etc.) contributes to the category’s total weight, providing a quantitative measure of the malware’s behavioral focus.

Category Weight Percentage
Misc 4336 54.92%
System 3021 38.26%
Registry 378 4.79%
File System 71 0.90%
Synchronization 29 0.37%
Process 20 0.25%
Threading 14 0.18%
Com 10 0.13%
Windows 7 0.09%
Device 4 0.05%
Services 4 0.05%
Hooking 1 0.01%

MITRE ATT&CK Mapping

  • T1027.002 – packed with Mpress
  • T1027 – The binary likely contains encrypted or compressed data
  • T1027 – Executable file is packed/obfuscated with MPRESS
  • T1027 – The binary contains an unknown PE section name indicative of packing
  • T1027.002 – The binary likely contains encrypted or compressed data
  • T1027.002 – Executable file is packed/obfuscated with MPRESS
  • T1027.002 – The binary contains an unknown PE section name indicative of packing
  • T1071 – Yara detections observed in process dumps, payloads or dropped files
  • T1071 – Binary file triggered YARA rule
  • T1006 – Accesses physical drive
  • T1027.002 – Resolves API functions dynamically
  • T1112 – Disables a crucial system tool
  • T1113 – Takes screenshot
  • T1490 – Disables a crucial system tool
  • T1542.003 – Writes to Master Boot Record (MBR)
  • T1542.003 – Infects the bootmgr code of the hard disk
  • T1542.003 – Infects the boot sector of the hard disk
  • T1542.003 – Writes directly to the primary disk partition (DR0)
  • T1562.001 – Disable Task Manager(disabletaskmgr)
  • T1562.001 – Disables the Windows task manager (taskmgr)
  • T1497 – May sleep (evasive loops) to hinder dynamic analysis
  • T1497 – Queries disk information (often used to detect virtual machines)
  • T1027.002 – Binary may include packed or crypted data
  • T1027.002 – PE file has section (not .text) which is very likely to contain packed code (zlib compression ratio < 0.011)
  • T1027 – Binary may include packed or crypted data
  • T1518.001 – Queries disk information (often used to detect virtual machines)
  • T1082 – Queries disk information (often used to detect virtual machines)

Following the Trail — Network & DNS Activity

Outbound activity leans on reputable infrastructure (e.g., CDNs, cloud endpoints) to blend in. TLS sessions and
HTTP calls show routine beaconing and IP‑lookup behavior that can masquerade as normal browsing.

Contacted Domains

Domain IP Country ASN/Org
www.aieov.com 76.223.54.146 United States Amazon.com, Inc.
www.msftncsi.com 23.200.3.20 United States Akamai Technologies, Inc.

Observed IPs

IP Country ASN/Org
224.0.0.252
239.255.255.250
8.8.4.4 United States Google LLC
8.8.8.8 United States Google LLC

DNS Queries

Request Type
www.msftncsi.com A
5isohu.com A
www.aieov.com A

Contacted IPs

IP Country ASN/Org
224.0.0.252
239.255.255.250
8.8.4.4 United States Google LLC
8.8.8.8 United States Google LLC

Port Distribution

Port Count Protocols
137 1 udp
138 1 udp
5355 5 udp
53 30 udp
3702 1 udp

UDP Packets

Source IP Dest IP Sport Dport Time Proto
192.168.56.11 192.168.56.255 137 137 3.2445991039276123 udp
192.168.56.11 192.168.56.255 138 138 9.245098114013672 udp
192.168.56.11 224.0.0.252 49563 5355 3.187124013900757 udp
192.168.56.11 224.0.0.252 54650 5355 3.1900441646575928 udp
192.168.56.11 224.0.0.252 55601 5355 3.945010185241699 udp
192.168.56.11 224.0.0.252 60205 5355 3.1992580890655518 udp
192.168.56.11 224.0.0.252 62798 5355 5.744945049285889 udp
192.168.56.11 239.255.255.250 62184 3702 3.1960620880126953 udp
192.168.56.11 8.8.4.4 51628 53 112.41693305969238 udp
192.168.56.11 8.8.4.4 51663 53 173.93279719352722 udp
192.168.56.11 8.8.4.4 51690 53 6.5143091678619385 udp
192.168.56.11 8.8.4.4 51880 53 206.6512291431427 udp
192.168.56.11 8.8.4.4 51899 53 5.760042190551758 udp
192.168.56.11 8.8.4.4 56213 53 36.30427622795105 udp
192.168.56.11 8.8.4.4 56473 53 97.97886419296265 udp
192.168.56.11 8.8.4.4 58917 53 79.64203119277954 udp
192.168.56.11 8.8.4.4 59770 53 50.888169050216675 udp
192.168.56.11 8.8.4.4 60334 53 126.81355810165405 udp
192.168.56.11 8.8.4.4 61507 53 145.1057150363922 udp
192.168.56.11 8.8.4.4 62120 53 159.500235080719 udp
192.168.56.11 8.8.4.4 62329 53 65.26071619987488 udp
192.168.56.11 8.8.4.4 63439 53 21.885004997253418 udp
192.168.56.11 8.8.4.4 63550 53 192.27318501472473 udp
192.168.56.11 8.8.8.8 51628 53 111.4155011177063 udp
192.168.56.11 8.8.8.8 51663 53 172.9311921596527 udp
192.168.56.11 8.8.8.8 51690 53 7.5097010135650635 udp
192.168.56.11 8.8.8.8 51880 53 205.65179109573364 udp
192.168.56.11 8.8.8.8 51899 53 6.760091066360474 udp
192.168.56.11 8.8.8.8 56213 53 35.2957661151886 udp
192.168.56.11 8.8.8.8 56473 53 96.96596622467041 udp
192.168.56.11 8.8.8.8 58917 53 78.63913917541504 udp
192.168.56.11 8.8.8.8 59770 53 49.88641119003296 udp
192.168.56.11 8.8.8.8 60334 53 125.81172800064087 udp
192.168.56.11 8.8.8.8 61507 53 144.10485410690308 udp
192.168.56.11 8.8.8.8 62120 53 158.4998540878296 udp
192.168.56.11 8.8.8.8 62329 53 64.25975203514099 udp
192.168.56.11 8.8.8.8 63439 53 20.877750158309937 udp
192.168.56.11 8.8.8.8 63550 53 191.27178406715393 udp

Hunting tip: alert on unknown binaries initiating TLS to IP‑lookup services or unusual CDN endpoints — especially early in execution.

Persistence & Policy — Registry and Services

Registry and service telemetry points to policy awareness and environment reconnaissance rather than noisy persistence. Below is a compact view of the most relevant keys and handles; expand to see the full lists where available.

Registry Opened

167

Registry Set

5

Services Started

0

Services Opened

1

Registry Opened (Top 25)

Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\DeviceState
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{3b790661-d981-4f91-84ff-6f2c375d8b33}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Rpc\Extensions\NdrOleExtDLL
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\Protocol
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\wavemapper
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\wave5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\4\NoStateFile
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\midi4
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\10\Transport
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\midi5
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{026e516e-b814-414b-83cd-856d6fef4822},2
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\6
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\midi6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{83da6326-97a6-4088-9453-a1923f573b29},6
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\4\QueryFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{12d83bd7-cf12-46be-8540-812710d3021c},1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\wave2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{1da5d803-d492-4edd-8c23-e0c0ffee7f0e},0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc},2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\Properties\{83da6326-97a6-4088-9453-a1923f573b29},6
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\3\QueryFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\Properties
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\4\IdType
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\3
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\4\Transport
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\5\Transport
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\11\Transport
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\2\QueryFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DRIVERS32
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\wave9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{9c119480-ddc2-4954-a150-5bd240d454ad},6
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\3\NoStateFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\1\NoStateFile
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Audio\DevApiIsRunningInVM
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\11\QueryFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc},2
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\3\IdType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc},6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\Properties\{194ef948-7cdb-403e-9f47-19418f7b24fd},1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\midi
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\5\IdType
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\1
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\10\UUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\Properties\{026e516e-b814-414b-83cd-856d6fef4822},2
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\wave7
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\11
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc},26
Show all (167 total)
Key
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\11\IdType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\midi3
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\5\UUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\11\NoStateFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\3\Transport
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\10\IdType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\wave1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\midi2
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\midimapper
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\1\Transport
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\1\QueryFile
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\wave6
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\SafeProcessSearchMode
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc},1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0},2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\Properties\{9c119480-ddc2-4954-a150-5bd240d454ad},6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{9c119480-ddc2-4954-a150-5bd240d454ad},1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\midi9
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\5
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\4
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\wave
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc},22
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\2\Transport
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\ShowHiddenEndpoints
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\wave8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\Properties\{1da5d803-d492-4edd-8c23-e0c0ffee7f0e},0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc},6
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\1\IdType
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\midi8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{194ef948-7cdb-403e-9f47-19418f7b24fd},1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\wave3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc},26
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\wdmaud.drv
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Audio
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\10
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\2
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\wave4
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\2\NoStateFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\DeviceState
HKEY_LOCAL_MACHINE\Software\Microsoft\Rpc\Extensions
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\2\IdType
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{3b790661-d981-4f91-84ff-6f2c375d8b33}\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0},2
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\midi7
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Drivers32\midi1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Protocol
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{81d8bc8a-ba62-4906-9166-11e050e22767}\Properties\{b3f8fa53-0004-438e-9003-51a46e139bfc},1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontLink\SystemLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0\Disable
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Tahoma
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0\DataFilePath
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DevQuery
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppModel\Lookaside\user
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Audio
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows NT\Rpc
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\InprocHandler
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\LocalServer32
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\SecurityManager\TransientObjects\%5C%5C.%5CRpc%5CAllowLpacAppExperience%5CInterface
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows\Display
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\OLE
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Segment Heap
HKEY_LOCAL_MACHINE\Software\Microsoft\Ole\FeatureDevelopmentProperties
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\DRIVERS32
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\OLE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{f1a9eb89-ca48-4606-b69d-4124e87215e5}
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\CTF\Compatibility\pidHRemastered.exe
HKEY_LOCAL_MACHINE\System\Setup
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\LocalServer
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Rpc\Extensions
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\OLE\Tracing
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\8
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\SdbUpdates\ManifestedMergeStubSdbs
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\SdbUpdates
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Windows
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\OOBE
HKEY_LOCAL_MACHINE\Software\Classes
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Nls\CustomLocale
HKEY_LOCAL_MACHINE\Software\Microsoft\Ole
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\InprocHandler32
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\7
HKEY_LOCAL_MACHINE\OSDATA\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Disable8And16BitMitigation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{23671bc7-1a03-44fa-ba59-7c99e25e7e40}
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Policies\Microsoft\MUI\Settings
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Input
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\GRE_Initialize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{f1a9eb89-ca48-4606-b69d-4124e87215e5}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\UILanguages\en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pidHRemastered.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\Elevation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppModel\Lookaside\machine
HKEY_LOCAL_MACHINE\Software\Microsoft\COM3
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager
HKEY_LOCAL_MACHINE\Software\Microsoft\Wow64\x86
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\Rpc
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows\Safer\CodeIdentifiers
HKEY_LOCAL_MACHINE\Software\WOW6432Node\Microsoft\LanguageOverlay\OverlayPackages\en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback\Segoe UI
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\CTF\
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\TreatAs
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\Cryptography\Configuration
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{23671bc7-1a03-44fa-ba59-7c99e25e7e40}\Properties
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Capture\{f1a9eb89-ca48-4606-b69d-4124e87215e5}\Properties
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\OLEAUT
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\DevQuery\9

Registry Set (Top 25)

Key Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr 1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr 1

Services Started (Top 15)

Services Opened (Top 15)

Service
AudioSrv

What To Do Now — Practical Defense Playbook

  • Contain unknowns: block first‑run binaries by default — signatures catch up, containment works now.
  • EDR controls: alert on keyboard hooks, screen capture APIs, VM/sandbox checks, and command‑shell launches.
  • Registry watch: flag queries/sets under policy paths (e.g., …\FipsAlgorithmPolicy\*).
  • Network rules: inspect outbound TLS to IP‑lookup services and unexpected CDN endpoints.
  • Hunt broadly: sweep endpoints for the indicators above and quarantine positives immediately.

Dwell time equals attacker opportunity. Reducing execution privileges and egress shrinks that window even when vendors disagree.

Scroll to Top