Analysis
-
max time kernel
165s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe
Resource
win10v2004-20220812-en
General
-
Target
57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe
-
Size
839KB
-
MD5
7d4581d7703b7933722c5fd137f81e10
-
SHA1
1b3b262e36e5387c51eb63979d0cf524d2c00323
-
SHA256
57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610
-
SHA512
12e2986042b99707f1b846e8a4bdac4f7eb3aba3e6597694d39e50425e38eaa461f9c054ac21c79339dba6425649042918af3909bc6c8c75d25e3e5b56dee6be
-
SSDEEP
24576:qu1ovvVfgIputUYjbkw0RSkafKynT4ZbTO:PovvK+uOYjbTkafKynw6
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\sCIocQsA\\dIgwsgAM.exe," 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\sCIocQsA\\dIgwsgAM.exe," 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\sCIocQsA\\dIgwsgAM.exe,C:\\ProgramData\\diIsEgMY\\BKkkgMUY.exe," 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\sCIocQsA\\dIgwsgAM.exe,C:\\ProgramData\\diIsEgMY\\BKkkgMUY.exe," 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 1716 mQMYIYgQ.exe 3500 dIgwsgAM.exe 3736 PgEYocEA.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation mQMYIYgQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BKkkgMUY.exe = "C:\\ProgramData\\diIsEgMY\\BKkkgMUY.exe" 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mQMYIYgQ.exe = "C:\\Users\\Admin\\bCQUokUk\\mQMYIYgQ.exe" 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mQMYIYgQ.exe = "C:\\Users\\Admin\\bCQUokUk\\mQMYIYgQ.exe" mQMYIYgQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dIgwsgAM.exe = "C:\\ProgramData\\sCIocQsA\\dIgwsgAM.exe" 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dIgwsgAM.exe = "C:\\ProgramData\\sCIocQsA\\dIgwsgAM.exe" dIgwsgAM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dIgwsgAM.exe = "C:\\ProgramData\\sCIocQsA\\dIgwsgAM.exe" PgEYocEA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OWcEgAUk.exe = "C:\\Users\\Admin\\fksIMMsw\\OWcEgAUk.exe" 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\bCQUokUk PgEYocEA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\bCQUokUk\mQMYIYgQ PgEYocEA.exe File created C:\Windows\SysWOW64\shell32.dll.exe mQMYIYgQ.exe File opened for modification C:\Windows\SysWOW64\sheDisableSave.pdf mQMYIYgQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1184 4580 WerFault.exe 673 316 4528 WerFault.exe 672 2768 1276 WerFault.exe 674 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 3256 reg.exe 2516 reg.exe 4684 reg.exe 2960 reg.exe 4252 reg.exe 2228 reg.exe 4500 reg.exe 4040 reg.exe 4856 reg.exe 3280 reg.exe 2264 reg.exe 2348 reg.exe 4420 reg.exe 4580 reg.exe 1864 reg.exe 2716 reg.exe 2804 reg.exe 668 reg.exe 3112 reg.exe 1728 reg.exe 4764 reg.exe 3648 reg.exe 4316 reg.exe 4516 reg.exe 2484 reg.exe 4532 reg.exe 1916 reg.exe 3972 reg.exe 840 reg.exe 4532 reg.exe 1408 reg.exe 1868 reg.exe 344 reg.exe 4260 reg.exe 524 reg.exe 4080 reg.exe 1120 reg.exe 2668 reg.exe 2388 reg.exe 3592 reg.exe 3400 reg.exe 3488 reg.exe 4396 reg.exe 400 reg.exe 536 reg.exe 2212 reg.exe 1380 reg.exe 4580 reg.exe 4084 reg.exe 2972 reg.exe 4804 reg.exe 1396 reg.exe 1880 reg.exe 4584 reg.exe 5072 reg.exe 1196 reg.exe 3800 reg.exe 1120 reg.exe 504 reg.exe 5096 reg.exe 2488 reg.exe 3104 reg.exe 3804 reg.exe 1880 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4536 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4536 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4536 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4536 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 2668 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 2668 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 2668 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 2668 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 2012 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 2012 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 2012 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 2012 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3856 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3856 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3856 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3856 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 524 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 524 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 524 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 524 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3900 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3900 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3900 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3900 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 5024 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 5024 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 5024 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 5024 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4500 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4500 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4500 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4500 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3600 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3600 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3600 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 3600 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 1364 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 1364 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 1364 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 1364 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4644 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4644 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4644 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4644 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 2388 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 2388 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 2388 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 2388 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4528 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4528 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4528 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 4528 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1716 mQMYIYgQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe 1716 mQMYIYgQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1716 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 79 PID 1440 wrote to memory of 1716 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 79 PID 1440 wrote to memory of 1716 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 79 PID 1440 wrote to memory of 3500 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 80 PID 1440 wrote to memory of 3500 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 80 PID 1440 wrote to memory of 3500 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 80 PID 1440 wrote to memory of 4692 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 82 PID 1440 wrote to memory of 4692 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 82 PID 1440 wrote to memory of 4692 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 82 PID 4692 wrote to memory of 1648 4692 cmd.exe 84 PID 4692 wrote to memory of 1648 4692 cmd.exe 84 PID 4692 wrote to memory of 1648 4692 cmd.exe 84 PID 1440 wrote to memory of 1916 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 85 PID 1440 wrote to memory of 1916 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 85 PID 1440 wrote to memory of 1916 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 85 PID 1440 wrote to memory of 4040 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 89 PID 1440 wrote to memory of 4040 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 89 PID 1440 wrote to memory of 4040 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 89 PID 1440 wrote to memory of 1976 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 86 PID 1440 wrote to memory of 1976 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 86 PID 1440 wrote to memory of 1976 1440 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 86 PID 1648 wrote to memory of 1564 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 91 PID 1648 wrote to memory of 1564 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 91 PID 1648 wrote to memory of 1564 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 91 PID 1564 wrote to memory of 3132 1564 cmd.exe 93 PID 1564 wrote to memory of 3132 1564 cmd.exe 93 PID 1564 wrote to memory of 3132 1564 cmd.exe 93 PID 1648 wrote to memory of 3320 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 94 PID 1648 wrote to memory of 3320 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 94 PID 1648 wrote to memory of 3320 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 94 PID 1648 wrote to memory of 5048 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 95 PID 1648 wrote to memory of 5048 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 95 PID 1648 wrote to memory of 5048 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 95 PID 1648 wrote to memory of 4496 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 99 PID 1648 wrote to memory of 4496 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 99 PID 1648 wrote to memory of 4496 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 99 PID 1648 wrote to memory of 784 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 97 PID 1648 wrote to memory of 784 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 97 PID 1648 wrote to memory of 784 1648 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 97 PID 3132 wrote to memory of 4104 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 102 PID 3132 wrote to memory of 4104 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 102 PID 3132 wrote to memory of 4104 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 102 PID 3132 wrote to memory of 5108 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 104 PID 3132 wrote to memory of 5108 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 104 PID 3132 wrote to memory of 5108 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 104 PID 3132 wrote to memory of 4196 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 105 PID 3132 wrote to memory of 4196 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 105 PID 3132 wrote to memory of 4196 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 105 PID 3132 wrote to memory of 2388 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 107 PID 3132 wrote to memory of 2388 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 107 PID 3132 wrote to memory of 2388 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 107 PID 3132 wrote to memory of 2800 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 109 PID 3132 wrote to memory of 2800 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 109 PID 3132 wrote to memory of 2800 3132 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 109 PID 4104 wrote to memory of 4536 4104 cmd.exe 112 PID 4104 wrote to memory of 4536 4104 cmd.exe 112 PID 4104 wrote to memory of 4536 4104 cmd.exe 112 PID 4536 wrote to memory of 4712 4536 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 115 PID 4536 wrote to memory of 4712 4536 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 115 PID 4536 wrote to memory of 4712 4536 57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe 115 PID 784 wrote to memory of 2472 784 cmd.exe 113 PID 784 wrote to memory of 2472 784 cmd.exe 113 PID 784 wrote to memory of 2472 784 cmd.exe 113 PID 2800 wrote to memory of 2376 2800 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe"C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\bCQUokUk\mQMYIYgQ.exe"C:\Users\Admin\bCQUokUk\mQMYIYgQ.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1716
-
-
C:\ProgramData\sCIocQsA\dIgwsgAM.exe"C:\ProgramData\sCIocQsA\dIgwsgAM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"2⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e6103⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"4⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e6105⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"6⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e6107⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"8⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e6109⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"10⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61011⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"12⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61013⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"14⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61015⤵
- Suspicious behavior: EnumeratesProcesses
PID:524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"16⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61017⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"18⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61019⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"20⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61021⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"22⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61023⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"24⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61025⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"26⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61027⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"28⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61029⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"30⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61031⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"32⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61033⤵PID:4852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"34⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61035⤵PID:4172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"36⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61037⤵PID:1636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"38⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61039⤵PID:4396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"40⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61041⤵PID:3748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"42⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61043⤵PID:4232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"44⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61045⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"46⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61047⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"48⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61049⤵PID:524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"50⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61051⤵PID:216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"52⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61053⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"54⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61055⤵PID:3680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"56⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61057⤵PID:4184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"58⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61059⤵PID:4484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"60⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61061⤵PID:4108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"62⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61063⤵PID:1184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"64⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61065⤵PID:2716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"66⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61067⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"68⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61069⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"70⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61071⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"72⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61073⤵PID:4792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"74⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61075⤵PID:3776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"76⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61077⤵PID:444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"78⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61079⤵PID:4156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"80⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61081⤵PID:3104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"82⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61083⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"84⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61085⤵PID:1440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"86⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61087⤵PID:4472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"88⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61089⤵PID:1388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"90⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61091⤵PID:1196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"92⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61093⤵PID:3448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"94⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61095⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"96⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61097⤵PID:1372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"98⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e61099⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
PID:4796 -
C:\Users\Admin\fksIMMsw\OWcEgAUk.exe"C:\Users\Admin\fksIMMsw\OWcEgAUk.exe"100⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 284101⤵
- Program crash
PID:316
-
-
-
C:\ProgramData\diIsEgMY\BKkkgMUY.exe"C:\ProgramData\diIsEgMY\BKkkgMUY.exe"100⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 268101⤵
- Program crash
PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"100⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610101⤵PID:4260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"102⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610103⤵PID:5012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"104⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610105⤵PID:4160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"106⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610107⤵PID:3560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"108⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610109⤵PID:3612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"110⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610111⤵PID:1196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"112⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610113⤵PID:1664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"114⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610115⤵PID:1168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"116⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610117⤵PID:784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"118⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610119⤵PID:5020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"120⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610.exeC:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610121⤵PID:1736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57a4675a8231450ac70c34e2c52133eb3efc7424879abe9726167fbd0941e610"122⤵PID:5012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-