Analysis
-
max time kernel
151s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe
Resource
win10v2004-20220901-en
General
-
Target
a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe
-
Size
834KB
-
MD5
30f15a801dc2562f4ca607c06415e810
-
SHA1
bca52ea91eddcd0adc20d1126b900dd771fc3e67
-
SHA256
a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab
-
SHA512
387f432da3ddd26a071b544df13213eefb003dffe371f9b9ba0bf9897bd8b412672e0f16ab1c018579c948516fb203ffae66d5aa182f16f751d4fef93f76abe9
-
SSDEEP
12288:B3Mh0YJwRrs6EqjhVpa6J7+Yae2oIqzxi9Nm1B3tPLZKQm/jv4i2O7jZb99ckQJA:Buh6JqmQYIuCwgj9rKw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\fmQYcsQM\\QUYAswss.exe," a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\fmQYcsQM\\QUYAswss.exe," a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\fmQYcsQM\\QUYAswss.exe,C:\\ProgramData\\aYwEEIoQ\\kCAgwwwA.exe," a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\fmQYcsQM\\QUYAswss.exe,C:\\ProgramData\\aYwEEIoQ\\kCAgwwwA.exe," a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2044 paAIUkUY.exe 940 QUYAswss.exe 884 KyogUYAI.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\SelectRead.png.exe QUYAswss.exe File opened for modification C:\Users\Admin\Pictures\SelectRead.png.exe paAIUkUY.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation paAIUkUY.exe -
Deletes itself 1 IoCs
pid Process 928 cmd.exe -
Loads dropped DLL 26 IoCs
pid Process 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 940 QUYAswss.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\paAIUkUY.exe = "C:\\Users\\Admin\\hcQEosgk\\paAIUkUY.exe" a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QUYAswss.exe = "C:\\ProgramData\\fmQYcsQM\\QUYAswss.exe" a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QUYAswss.exe = "C:\\ProgramData\\fmQYcsQM\\QUYAswss.exe" QUYAswss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\paAIUkUY.exe = "C:\\Users\\Admin\\hcQEosgk\\paAIUkUY.exe" paAIUkUY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QUYAswss.exe = "C:\\ProgramData\\fmQYcsQM\\QUYAswss.exe" KyogUYAI.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\BsQIAMkk.exe = "C:\\Users\\Admin\\NeUsoUYM\\BsQIAMkk.exe" a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kCAgwwwA.exe = "C:\\ProgramData\\aYwEEIoQ\\kCAgwwwA.exe" a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\hcQEosgk KyogUYAI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\hcQEosgk\paAIUkUY KyogUYAI.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico QUYAswss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1408 1756 WerFault.exe 1828 1540 WerFault.exe 1660 1356 WerFault.exe 142 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1616 reg.exe 1612 reg.exe 1804 reg.exe 1456 reg.exe 1384 reg.exe 456 reg.exe 1532 reg.exe 548 reg.exe 1972 reg.exe 316 reg.exe 616 reg.exe 1092 reg.exe 1092 reg.exe 1224 reg.exe 828 reg.exe 1508 reg.exe 1072 reg.exe 1160 reg.exe 1276 reg.exe 2008 reg.exe 456 reg.exe 1360 reg.exe 1276 reg.exe 1620 reg.exe 1592 reg.exe 684 reg.exe 1268 reg.exe 1572 reg.exe 1640 reg.exe 2028 reg.exe 828 reg.exe 1996 reg.exe 928 reg.exe 740 reg.exe 548 reg.exe 1624 reg.exe 1992 reg.exe 1660 reg.exe 1624 reg.exe 1676 reg.exe 1640 reg.exe 600 reg.exe 1160 reg.exe 1524 reg.exe 1328 reg.exe 1880 reg.exe 1000 reg.exe 740 reg.exe 740 reg.exe 1392 reg.exe 1072 reg.exe 2004 reg.exe 888 reg.exe 1824 reg.exe 1304 reg.exe 2028 reg.exe 1328 reg.exe 568 reg.exe 1880 reg.exe 820 reg.exe 2028 reg.exe 432 reg.exe 1640 reg.exe 1560 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1636 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1636 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1824 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1824 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1956 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1956 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1636 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1636 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1360 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1360 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1492 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1492 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1616 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1616 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1392 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1392 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 616 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 616 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1612 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1612 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1508 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1508 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 2032 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 2032 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1300 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1300 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1992 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1992 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 900 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 900 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1464 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1464 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1148 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1148 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1384 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1384 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 860 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 860 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1424 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1424 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 740 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 740 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1392 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1392 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1956 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1956 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1676 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1676 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1424 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1424 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1596 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1596 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 2032 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 2032 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1716 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1716 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 888 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 888 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1388 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 1388 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe 2044 paAIUkUY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2044 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 27 PID 1304 wrote to memory of 2044 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 27 PID 1304 wrote to memory of 2044 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 27 PID 1304 wrote to memory of 2044 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 27 PID 1304 wrote to memory of 940 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 28 PID 1304 wrote to memory of 940 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 28 PID 1304 wrote to memory of 940 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 28 PID 1304 wrote to memory of 940 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 28 PID 1304 wrote to memory of 1384 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 30 PID 1304 wrote to memory of 1384 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 30 PID 1304 wrote to memory of 1384 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 30 PID 1304 wrote to memory of 1384 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 30 PID 1384 wrote to memory of 548 1384 cmd.exe 32 PID 1384 wrote to memory of 548 1384 cmd.exe 32 PID 1384 wrote to memory of 548 1384 cmd.exe 32 PID 1384 wrote to memory of 548 1384 cmd.exe 32 PID 1304 wrote to memory of 1456 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 33 PID 1304 wrote to memory of 1456 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 33 PID 1304 wrote to memory of 1456 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 33 PID 1304 wrote to memory of 1456 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 33 PID 1304 wrote to memory of 888 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 34 PID 1304 wrote to memory of 888 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 34 PID 1304 wrote to memory of 888 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 34 PID 1304 wrote to memory of 888 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 34 PID 1304 wrote to memory of 1368 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 36 PID 1304 wrote to memory of 1368 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 36 PID 1304 wrote to memory of 1368 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 36 PID 1304 wrote to memory of 1368 1304 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 36 PID 548 wrote to memory of 1492 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 39 PID 548 wrote to memory of 1492 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 39 PID 548 wrote to memory of 1492 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 39 PID 548 wrote to memory of 1492 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 39 PID 1492 wrote to memory of 1636 1492 cmd.exe 41 PID 1492 wrote to memory of 1636 1492 cmd.exe 41 PID 1492 wrote to memory of 1636 1492 cmd.exe 41 PID 1492 wrote to memory of 1636 1492 cmd.exe 41 PID 548 wrote to memory of 992 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 42 PID 548 wrote to memory of 992 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 42 PID 548 wrote to memory of 992 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 42 PID 548 wrote to memory of 992 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 42 PID 548 wrote to memory of 1832 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 43 PID 548 wrote to memory of 1832 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 43 PID 548 wrote to memory of 1832 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 43 PID 548 wrote to memory of 1832 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 43 PID 1636 wrote to memory of 1084 1636 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 44 PID 1636 wrote to memory of 1084 1636 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 44 PID 1636 wrote to memory of 1084 1636 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 44 PID 1636 wrote to memory of 1084 1636 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 44 PID 548 wrote to memory of 1092 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 46 PID 548 wrote to memory of 1092 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 46 PID 548 wrote to memory of 1092 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 46 PID 548 wrote to memory of 1092 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 46 PID 548 wrote to memory of 1804 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 49 PID 548 wrote to memory of 1804 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 49 PID 548 wrote to memory of 1804 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 49 PID 548 wrote to memory of 1804 548 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 49 PID 1084 wrote to memory of 1824 1084 cmd.exe 52 PID 1084 wrote to memory of 1824 1084 cmd.exe 52 PID 1084 wrote to memory of 1824 1084 cmd.exe 52 PID 1084 wrote to memory of 1824 1084 cmd.exe 52 PID 1636 wrote to memory of 1168 1636 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 53 PID 1636 wrote to memory of 1168 1636 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 53 PID 1636 wrote to memory of 1168 1636 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 53 PID 1636 wrote to memory of 1168 1636 a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe"C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\hcQEosgk\paAIUkUY.exe"C:\Users\Admin\hcQEosgk\paAIUkUY.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:2044
-
-
C:\ProgramData\fmQYcsQM\QUYAswss.exe"C:\ProgramData\fmQYcsQM\QUYAswss.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
PID:940
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"2⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"4⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"6⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"8⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"10⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"12⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"14⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"16⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"18⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab19⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
PID:1808 -
C:\Users\Admin\NeUsoUYM\BsQIAMkk.exe"C:\Users\Admin\NeUsoUYM\BsQIAMkk.exe"20⤵PID:1756
-
-
C:\ProgramData\aYwEEIoQ\kCAgwwwA.exe"C:\ProgramData\aYwEEIoQ\kCAgwwwA.exe"20⤵PID:1540
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"20⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"22⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab23⤵
- Suspicious behavior: EnumeratesProcesses
PID:616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"24⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"26⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"28⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"30⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"32⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"34⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab35⤵
- Suspicious behavior: EnumeratesProcesses
PID:900 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"36⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"38⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"40⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"42⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab43⤵
- Suspicious behavior: EnumeratesProcesses
PID:860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"44⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"46⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab47⤵
- Suspicious behavior: EnumeratesProcesses
PID:740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"48⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"50⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"52⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"54⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"56⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"58⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"60⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"62⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab63⤵
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"64⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab65⤵
- Suspicious behavior: EnumeratesProcesses
PID:1388 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"66⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab67⤵PID:1804
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"68⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab69⤵PID:432
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"70⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab71⤵PID:1960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"72⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab73⤵PID:1520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"74⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab75⤵PID:828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"76⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab77⤵PID:1368
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"78⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab79⤵PID:1092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"80⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab81⤵PID:928
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"82⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab83⤵PID:456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"84⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab85⤵PID:1936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"86⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab87⤵PID:928
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"88⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab89⤵PID:1552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"90⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab91⤵PID:1692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"92⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab93⤵PID:1392
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"94⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab95⤵PID:1532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"96⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab97⤵PID:1676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"98⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab99⤵PID:1392
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"100⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab101⤵PID:2004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"102⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab103⤵PID:1168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"104⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab105⤵PID:684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"106⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab107⤵PID:1788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"108⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab109⤵PID:1268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"110⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab111⤵PID:1424
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"112⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab113⤵PID:1592
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"114⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab115⤵PID:1660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"116⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab117⤵PID:1020
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"118⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab119⤵PID:1092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"120⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab.exeC:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab121⤵PID:892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a742a9005b463c7fc81681e9a74391b74df4e20eb9aebe4702d3f692e55db8ab"122⤵PID:1532
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-