Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe
Resource
win10v2004-20220901-en
General
-
Target
62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe
-
Size
498KB
-
MD5
3a5335a6d44a6a4abada30a7926f85c0
-
SHA1
c424c85867eaa40cbb1eafaed04f310bdbdf9f08
-
SHA256
62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f
-
SHA512
2d799b47592761d10a2000faada162162ce3935d4f1c2cf1387d8fdc5807321e891a624eb04770b38448ee327d0ae92652fd5c7c0174027306f1fdc7439a6abb
-
SSDEEP
12288:1Ikuy52PEqLz+oh6bhZXXu7aWSP/1oRao+VCWf7dDYe3:442cjl8781oRaVCWf7dUu
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\tGgIUoYM\\FIQcAgMs.exe," 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\tGgIUoYM\\FIQcAgMs.exe," 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 61 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4896 YiMUgIgg.exe 4828 FIQcAgMs.exe 1648 qgEcMYAg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation YiMUgIgg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FIQcAgMs.exe = "C:\\ProgramData\\tGgIUoYM\\FIQcAgMs.exe" qgEcMYAg.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YiMUgIgg.exe = "C:\\Users\\Admin\\DwAksUYk\\YiMUgIgg.exe" 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FIQcAgMs.exe = "C:\\ProgramData\\tGgIUoYM\\FIQcAgMs.exe" 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YiMUgIgg.exe = "C:\\Users\\Admin\\DwAksUYk\\YiMUgIgg.exe" YiMUgIgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FIQcAgMs.exe = "C:\\ProgramData\\tGgIUoYM\\FIQcAgMs.exe" FIQcAgMs.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheSetConvertTo.gif YiMUgIgg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\DwAksUYk qgEcMYAg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\DwAksUYk\YiMUgIgg qgEcMYAg.exe File created C:\Windows\SysWOW64\shell32.dll.exe YiMUgIgg.exe File opened for modification C:\Windows\SysWOW64\sheOpenUninstall.gif YiMUgIgg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1520 reg.exe 4516 reg.exe 1868 reg.exe 2240 reg.exe 5032 reg.exe 1552 reg.exe 4336 reg.exe 4624 reg.exe 2364 reg.exe 2460 reg.exe 3772 reg.exe 4220 reg.exe 4596 reg.exe 1392 reg.exe 3488 reg.exe 1152 reg.exe 1756 reg.exe 4440 reg.exe 1756 reg.exe 1392 reg.exe 4036 reg.exe 3428 reg.exe 4332 reg.exe 2184 reg.exe 4268 reg.exe 3808 reg.exe 1932 reg.exe 4324 reg.exe 2568 reg.exe 2716 reg.exe 2988 reg.exe 956 reg.exe 2888 reg.exe 2780 reg.exe 5052 reg.exe 368 reg.exe 2700 reg.exe 1804 reg.exe 3804 reg.exe 1908 reg.exe 4564 reg.exe 312 reg.exe 1160 reg.exe 3896 reg.exe 4320 reg.exe 1068 reg.exe 4376 reg.exe 368 reg.exe 4984 reg.exe 1520 reg.exe 1148 reg.exe 4940 reg.exe 3156 reg.exe 1156 reg.exe 2008 reg.exe 3580 reg.exe 5016 reg.exe 724 reg.exe 4768 reg.exe 4820 reg.exe 680 reg.exe 4520 reg.exe 4916 reg.exe 1292 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 2820 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 2820 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 2820 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 2820 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 5092 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 5092 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 5092 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 5092 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 2928 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 2928 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 2928 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 2928 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1352 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1352 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1352 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1352 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 2700 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 2700 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 2700 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 2700 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1460 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1460 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1460 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1460 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1468 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1468 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1468 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1468 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 3748 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 3748 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 3748 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 3748 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1328 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1328 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1328 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1328 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4356 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4356 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4356 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4356 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4116 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4116 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4116 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4116 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1152 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1152 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1152 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 1152 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4604 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4604 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4604 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 4604 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4896 YiMUgIgg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe 4896 YiMUgIgg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4896 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 80 PID 4944 wrote to memory of 4896 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 80 PID 4944 wrote to memory of 4896 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 80 PID 4944 wrote to memory of 4828 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 81 PID 4944 wrote to memory of 4828 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 81 PID 4944 wrote to memory of 4828 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 81 PID 4944 wrote to memory of 1684 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 83 PID 4944 wrote to memory of 1684 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 83 PID 4944 wrote to memory of 1684 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 83 PID 4944 wrote to memory of 4332 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 86 PID 4944 wrote to memory of 4332 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 86 PID 4944 wrote to memory of 4332 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 86 PID 1684 wrote to memory of 4596 1684 cmd.exe 85 PID 1684 wrote to memory of 4596 1684 cmd.exe 85 PID 1684 wrote to memory of 4596 1684 cmd.exe 85 PID 4944 wrote to memory of 2700 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 91 PID 4944 wrote to memory of 2700 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 91 PID 4944 wrote to memory of 2700 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 91 PID 4944 wrote to memory of 2184 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 89 PID 4944 wrote to memory of 2184 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 89 PID 4944 wrote to memory of 2184 4944 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 89 PID 4596 wrote to memory of 1444 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 92 PID 4596 wrote to memory of 1444 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 92 PID 4596 wrote to memory of 1444 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 92 PID 1444 wrote to memory of 4492 1444 cmd.exe 94 PID 1444 wrote to memory of 4492 1444 cmd.exe 94 PID 1444 wrote to memory of 4492 1444 cmd.exe 94 PID 4596 wrote to memory of 680 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 95 PID 4596 wrote to memory of 680 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 95 PID 4596 wrote to memory of 680 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 95 PID 4596 wrote to memory of 1060 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 96 PID 4596 wrote to memory of 1060 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 96 PID 4596 wrote to memory of 1060 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 96 PID 4596 wrote to memory of 4520 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 99 PID 4596 wrote to memory of 4520 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 99 PID 4596 wrote to memory of 4520 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 99 PID 4596 wrote to memory of 368 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 100 PID 4596 wrote to memory of 368 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 100 PID 4596 wrote to memory of 368 4596 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 100 PID 4492 wrote to memory of 4788 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 104 PID 4492 wrote to memory of 4788 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 104 PID 4492 wrote to memory of 4788 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 104 PID 4492 wrote to memory of 2028 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 105 PID 4492 wrote to memory of 2028 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 105 PID 4492 wrote to memory of 2028 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 105 PID 4492 wrote to memory of 4312 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 106 PID 4492 wrote to memory of 4312 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 106 PID 4492 wrote to memory of 4312 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 106 PID 4492 wrote to memory of 1960 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 109 PID 4492 wrote to memory of 1960 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 109 PID 4492 wrote to memory of 1960 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 109 PID 4492 wrote to memory of 4392 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 111 PID 4492 wrote to memory of 4392 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 111 PID 4492 wrote to memory of 4392 4492 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 111 PID 4788 wrote to memory of 2820 4788 cmd.exe 113 PID 4788 wrote to memory of 2820 4788 cmd.exe 113 PID 4788 wrote to memory of 2820 4788 cmd.exe 113 PID 368 wrote to memory of 4692 368 cmd.exe 115 PID 368 wrote to memory of 4692 368 cmd.exe 115 PID 368 wrote to memory of 4692 368 cmd.exe 115 PID 4392 wrote to memory of 3644 4392 cmd.exe 114 PID 4392 wrote to memory of 3644 4392 cmd.exe 114 PID 4392 wrote to memory of 3644 4392 cmd.exe 114 PID 2820 wrote to memory of 2888 2820 62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe 116 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe"C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\DwAksUYk\YiMUgIgg.exe"C:\Users\Admin\DwAksUYk\YiMUgIgg.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4896
-
-
C:\ProgramData\tGgIUoYM\FIQcAgMs.exe"C:\ProgramData\tGgIUoYM\FIQcAgMs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"2⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"4⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"6⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"8⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f9⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"10⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"12⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"14⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"16⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"18⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"20⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"22⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"24⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"26⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"28⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"30⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"32⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f33⤵PID:408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"34⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f35⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"36⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f37⤵PID:1552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"38⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f39⤵PID:4532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"40⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f41⤵PID:3544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"42⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f43⤵PID:4036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"44⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f45⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"46⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f47⤵PID:456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"48⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f49⤵PID:5028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"50⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f51⤵PID:4668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"52⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f53⤵PID:4116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"54⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f55⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"56⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f57⤵PID:2952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"58⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f59⤵PID:4044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"60⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f61⤵PID:1512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"62⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f63⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"64⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f65⤵PID:4120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"66⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f67⤵PID:1168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"68⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f69⤵PID:3024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"70⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f71⤵PID:3428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"72⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f73⤵
- Modifies visibility of file extensions in Explorer
PID:4624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"74⤵PID:1148
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:4716
-
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f75⤵PID:1824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"76⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f77⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"78⤵PID:1684
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵
- UAC bypass
PID:5092
-
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f79⤵PID:3032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"80⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f81⤵PID:2920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"82⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f83⤵PID:3580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"84⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f85⤵PID:3008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"86⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f87⤵PID:4764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"88⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f89⤵PID:4876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"90⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f91⤵PID:3800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"92⤵PID:4092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f93⤵PID:2184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"94⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f95⤵PID:3204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"96⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f97⤵PID:2416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"98⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f99⤵PID:1104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"100⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f101⤵PID:3440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"102⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f103⤵PID:2920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"104⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f105⤵PID:4116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"106⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f107⤵PID:368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"108⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f109⤵PID:1104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"110⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f111⤵PID:4816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"112⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f113⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"114⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f115⤵PID:1160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"116⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f117⤵PID:424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"118⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f119⤵PID:2164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"120⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f.exeC:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f121⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62186ea738f347bb8225f5b9d703ef80b5595dd473497fd64ba264ac78dc516f"122⤵PID:1960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-