Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 09:21
Static task
static1
Behavioral task
behavioral1
Sample
af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe
Resource
win10v2004-20221111-en
General
-
Target
af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe
-
Size
439KB
-
MD5
13927a54ef0ad71d600f3554ac427630
-
SHA1
4bff92d984441a869fdd2e44571213e9f87a2d68
-
SHA256
af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a
-
SHA512
05716d368f8179577afee6318078fc20179b04fcf84ab6f7ed41bd15228bd86becd070c55a70ef95f0d7e547c4ae57c718e5392853269ba1d1f747daeaf6dd6f
-
SSDEEP
12288:IhcUghLaFX9TupxkPAwtpbA6lJbaiamBWyYcuzzbUMcgnkqY:IGUmIXdupxrwtpbAgJD5rPUkL
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 4 IoCs
pid Process 2012 QqYkgIIE.exe 1976 WosQAsYM.exe 1100 oqkQYsAk.exe 1668 XeUUMwkk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\International\Geo\Nation WosQAsYM.exe -
Loads dropped DLL 29 IoCs
pid Process 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 2012 QqYkgIIE.exe 2012 QqYkgIIE.exe 2012 QqYkgIIE.exe 2012 QqYkgIIE.exe 2012 QqYkgIIE.exe 2012 QqYkgIIE.exe 2012 QqYkgIIE.exe 2012 QqYkgIIE.exe 2012 QqYkgIIE.exe 2012 QqYkgIIE.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 812 WerFault.exe 812 WerFault.exe 812 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\QqYkgIIE.exe = "C:\\Users\\Admin\\aYQYEUks\\QqYkgIIE.exe" af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WosQAsYM.exe = "C:\\ProgramData\\SaEMkEUg\\WosQAsYM.exe" af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\QqYkgIIE.exe = "C:\\Users\\Admin\\aYQYEUks\\QqYkgIIE.exe" QqYkgIIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WosQAsYM.exe = "C:\\ProgramData\\SaEMkEUg\\WosQAsYM.exe" WosQAsYM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WosQAsYM.exe = "C:\\ProgramData\\SaEMkEUg\\WosQAsYM.exe" oqkQYsAk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\FwAcEYUA.exe = "C:\\Users\\Admin\\cmAcccgc\\FwAcEYUA.exe" af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nyAAYEkM.exe = "C:\\ProgramData\\VgAUAQUY\\nyAAYEkM.exe" af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\aYQYEUks\QqYkgIIE oqkQYsAk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\aYQYEUks oqkQYsAk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 1700 1708 WerFault.exe 451 892 1252 WerFault.exe 453 1448 1504 WerFault.exe 455 812 1668 WerFault.exe 1212 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2024 reg.exe 1840 reg.exe 932 reg.exe 884 reg.exe 1308 reg.exe 1504 reg.exe 1844 reg.exe 1984 reg.exe 1636 reg.exe 620 reg.exe 1632 reg.exe 880 reg.exe 912 reg.exe 1556 reg.exe 912 reg.exe 1716 reg.exe 1672 reg.exe 1504 reg.exe 892 reg.exe 840 reg.exe 1932 reg.exe 1920 reg.exe 1620 reg.exe 644 reg.exe 884 reg.exe 936 reg.exe 1592 reg.exe 1796 reg.exe 936 reg.exe 888 reg.exe 1504 reg.exe 668 reg.exe 1908 reg.exe 1068 reg.exe 1908 reg.exe 1016 reg.exe 668 reg.exe 1456 reg.exe 1592 reg.exe 1628 reg.exe 672 reg.exe 1676 reg.exe 284 reg.exe 1016 reg.exe 1556 reg.exe 912 reg.exe 1332 reg.exe 1016 reg.exe 1920 reg.exe 1392 reg.exe 668 reg.exe 840 reg.exe 556 reg.exe 1676 reg.exe 316 reg.exe 1112 reg.exe 1364 reg.exe 912 reg.exe 1576 reg.exe 1504 reg.exe 1352 reg.exe 668 reg.exe 812 reg.exe 892 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1668 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1668 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 812 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 812 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1396 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1396 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1716 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1716 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1352 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1352 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1676 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1676 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1340 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1340 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1040 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1040 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1332 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1332 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 556 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 556 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1636 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1636 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1056 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1056 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 836 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 836 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1628 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1628 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 884 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 884 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 852 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 852 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 812 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 812 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1916 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1916 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1332 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1332 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1684 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1684 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1600 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1600 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1352 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1352 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1524 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1524 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1396 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1396 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1776 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1776 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1324 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1324 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1584 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1584 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 540 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 540 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 308 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 308 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1840 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1840 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe 1976 WosQAsYM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2012 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 28 PID 1724 wrote to memory of 2012 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 28 PID 1724 wrote to memory of 2012 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 28 PID 1724 wrote to memory of 2012 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 28 PID 1724 wrote to memory of 1976 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 29 PID 1724 wrote to memory of 1976 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 29 PID 1724 wrote to memory of 1976 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 29 PID 1724 wrote to memory of 1976 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 29 PID 1724 wrote to memory of 1532 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 31 PID 1724 wrote to memory of 1532 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 31 PID 1724 wrote to memory of 1532 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 31 PID 1724 wrote to memory of 1532 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 31 PID 1532 wrote to memory of 1664 1532 cmd.exe 33 PID 1532 wrote to memory of 1664 1532 cmd.exe 33 PID 1532 wrote to memory of 1664 1532 cmd.exe 33 PID 1532 wrote to memory of 1664 1532 cmd.exe 33 PID 1724 wrote to memory of 888 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 34 PID 1724 wrote to memory of 888 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 34 PID 1724 wrote to memory of 888 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 34 PID 1724 wrote to memory of 888 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 34 PID 1724 wrote to memory of 300 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 36 PID 1724 wrote to memory of 300 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 36 PID 1724 wrote to memory of 300 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 36 PID 1724 wrote to memory of 300 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 36 PID 1724 wrote to memory of 1016 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 37 PID 1724 wrote to memory of 1016 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 37 PID 1724 wrote to memory of 1016 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 37 PID 1724 wrote to memory of 1016 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 37 PID 1664 wrote to memory of 1520 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 40 PID 1664 wrote to memory of 1520 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 40 PID 1664 wrote to memory of 1520 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 40 PID 1664 wrote to memory of 1520 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 40 PID 1520 wrote to memory of 1668 1520 cmd.exe 42 PID 1520 wrote to memory of 1668 1520 cmd.exe 42 PID 1520 wrote to memory of 1668 1520 cmd.exe 42 PID 1520 wrote to memory of 1668 1520 cmd.exe 42 PID 1664 wrote to memory of 1776 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 43 PID 1664 wrote to memory of 1776 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 43 PID 1664 wrote to memory of 1776 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 43 PID 1664 wrote to memory of 1776 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 43 PID 1668 wrote to memory of 912 1668 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 44 PID 1668 wrote to memory of 912 1668 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 44 PID 1668 wrote to memory of 912 1668 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 44 PID 1668 wrote to memory of 912 1668 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 44 PID 1664 wrote to memory of 316 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 47 PID 1664 wrote to memory of 316 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 47 PID 1664 wrote to memory of 316 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 47 PID 1664 wrote to memory of 316 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 47 PID 1664 wrote to memory of 1392 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 45 PID 1664 wrote to memory of 1392 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 45 PID 1664 wrote to memory of 1392 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 45 PID 1664 wrote to memory of 1392 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 45 PID 912 wrote to memory of 812 912 cmd.exe 52 PID 912 wrote to memory of 812 912 cmd.exe 52 PID 912 wrote to memory of 812 912 cmd.exe 52 PID 912 wrote to memory of 812 912 cmd.exe 52 PID 1664 wrote to memory of 1892 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 51 PID 1664 wrote to memory of 1892 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 51 PID 1664 wrote to memory of 1892 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 51 PID 1664 wrote to memory of 1892 1664 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 51 PID 1724 wrote to memory of 2024 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 55 PID 1724 wrote to memory of 2024 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 55 PID 1724 wrote to memory of 2024 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 55 PID 1724 wrote to memory of 2024 1724 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe"C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\aYQYEUks\QqYkgIIE.exe"C:\Users\Admin\aYQYEUks\QqYkgIIE.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2012
-
-
C:\ProgramData\SaEMkEUg\WosQAsYM.exe"C:\ProgramData\SaEMkEUg\WosQAsYM.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:1976
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"2⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"4⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"6⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a7⤵
- Suspicious behavior: EnumeratesProcesses
PID:812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"8⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"10⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"12⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"14⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"16⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"18⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"20⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"22⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a23⤵
- Suspicious behavior: EnumeratesProcesses
PID:556 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"24⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"26⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"28⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a29⤵
- Suspicious behavior: EnumeratesProcesses
PID:836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"30⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"32⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a33⤵
- Suspicious behavior: EnumeratesProcesses
PID:884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"34⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a35⤵
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"36⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a37⤵
- Suspicious behavior: EnumeratesProcesses
PID:812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"38⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"40⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"42⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"44⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"46⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"48⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"50⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"52⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"54⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1324 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"56⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"58⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a59⤵
- Suspicious behavior: EnumeratesProcesses
PID:540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"60⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a61⤵
- Suspicious behavior: EnumeratesProcesses
PID:308 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"62⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"64⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a65⤵PID:1616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"66⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a67⤵PID:1332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"68⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a69⤵PID:988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"70⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a71⤵
- Adds Run key to start application
PID:1456 -
C:\Users\Admin\cmAcccgc\FwAcEYUA.exe"C:\Users\Admin\cmAcccgc\FwAcEYUA.exe"72⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 11673⤵
- Program crash
PID:1700
-
-
-
C:\ProgramData\VgAUAQUY\nyAAYEkM.exe"C:\ProgramData\VgAUAQUY\nyAAYEkM.exe"72⤵PID:1252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 8873⤵
- Program crash
PID:892
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"72⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a73⤵PID:1564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"74⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a75⤵PID:1520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"76⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a77⤵PID:1620
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"78⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a79⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"80⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a81⤵PID:1308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"82⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a83⤵PID:1520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"84⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a85⤵PID:1512
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"86⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a87⤵PID:1724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"88⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a89⤵PID:1520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"90⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a91⤵PID:1932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"92⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a93⤵PID:880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"94⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a95⤵PID:1584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"96⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a97⤵PID:888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"98⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a99⤵PID:880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"100⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a101⤵PID:308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"102⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a103⤵PID:888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"104⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a105⤵PID:840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"106⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a107⤵PID:1364
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"108⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a109⤵PID:1068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"110⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a111⤵PID:1448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"112⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a113⤵PID:1920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"114⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a115⤵PID:1676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"116⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a117⤵PID:1552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"118⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a119⤵PID:1932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"120⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a121⤵PID:644
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"122⤵PID:1520
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-