Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 13:41
Static task
static1
Behavioral task
behavioral1
Sample
2288274507c221f12776ff15b93d303a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2288274507c221f12776ff15b93d303a.exe
Resource
win10v2004-20231215-en
General
-
Target
2288274507c221f12776ff15b93d303a.exe
-
Size
484KB
-
MD5
2288274507c221f12776ff15b93d303a
-
SHA1
e455a4f5785a0cfcaf35be4ece87f44e708341ed
-
SHA256
fc688d6e94195b6a2d13e4c09c23384a822375cbdba0032e3aeee2bb6c765c77
-
SHA512
58f2b40879d3bee2badfe5f08af2ec65c5f5ad0e4e6a2c31f0cd0a3c0dd9d52523cfb0c70f15b3d6ea34ff606aec9ca7705a178fa93d1f5c86a55a91b657dbf4
-
SSDEEP
12288:08oOHceJryOy5EIJ4FWc4CB+Hik0dMmfrrYo6lZUqWF:08ojOtIiArCB+CkM7rrZ6o
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2288274507c221f12776ff15b93d303a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WMIADAP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wmiprvse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (53) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Control Panel\International\Geo\Nation QsYEkIQQ.exe -
Executes dropped EXE 4 IoCs
pid Process 2084 QsYEkIQQ.exe 2740 ZOkkgYYw.exe 3008 cicgkMMU.exe 2336 reg.exe -
Loads dropped DLL 25 IoCs
pid Process 2220 2288274507c221f12776ff15b93d303a.exe 2220 2288274507c221f12776ff15b93d303a.exe 2220 2288274507c221f12776ff15b93d303a.exe 2220 2288274507c221f12776ff15b93d303a.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2328 conhost.exe 2328 conhost.exe 2328 conhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ZOkkgYYw.exe = "C:\\ProgramData\\gMEwIMUM\\ZOkkgYYw.exe" ZOkkgYYw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ZOkkgYYw.exe = "C:\\ProgramData\\gMEwIMUM\\ZOkkgYYw.exe" cicgkMMU.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\oQwAEgwo.exe = "C:\\Users\\Admin\\CIcMkwMU\\oQwAEgwo.exe" cscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WUsgIgoY.exe = "C:\\ProgramData\\PosEAMAc\\WUsgIgoY.exe" cscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\QsYEkIQQ.exe = "C:\\Users\\Admin\\PqocwIIY\\QsYEkIQQ.exe" 2288274507c221f12776ff15b93d303a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\QsYEkIQQ.exe = "C:\\Users\\Admin\\PqocwIIY\\QsYEkIQQ.exe" QsYEkIQQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ZOkkgYYw.exe = "C:\\ProgramData\\gMEwIMUM\\ZOkkgYYw.exe" 2288274507c221f12776ff15b93d303a.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2288274507c221f12776ff15b93d303a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2288274507c221f12776ff15b93d303a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2288274507c221f12776ff15b93d303a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2288274507c221f12776ff15b93d303a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2288274507c221f12776ff15b93d303a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\PqocwIIY cicgkMMU.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\PqocwIIY\QsYEkIQQ cicgkMMU.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico QsYEkIQQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2136 2960 WerFault.exe 184 2440 1888 WerFault.exe 186 2964 2864 WerFault.exe 188 2328 2336 WerFault.exe 478 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2944 reg.exe 1160 reg.exe 1168 reg.exe 2892 reg.exe 2328 reg.exe 1792 reg.exe 2404 reg.exe 3688 reg.exe 1780 reg.exe 3232 reg.exe 3780 reg.exe 3168 reg.exe 2840 reg.exe 2596 reg.exe 672 reg.exe 1588 reg.exe 1696 reg.exe 2420 reg.exe 3200 reg.exe 1940 reg.exe 2968 reg.exe 1692 reg.exe 1728 reg.exe 3736 reg.exe 2316 reg.exe 2428 reg.exe 3064 reg.exe 3712 reg.exe 3480 reg.exe 2916 reg.exe 2176 reg.exe 2972 reg.exe 3716 reg.exe 3952 reg.exe 2564 reg.exe 548 reg.exe 804 reg.exe 1172 reg.exe 3496 reg.exe 1744 reg.exe 1716 reg.exe 1712 reg.exe 1960 reg.exe 2556 reg.exe 2636 reg.exe 1288 reg.exe 3084 reg.exe 2116 reg.exe 1164 reg.exe 988 reg.exe 2972 reg.exe 1440 reg.exe 1288 reg.exe 2456 reg.exe 2592 reg.exe 3364 reg.exe 1700 reg.exe 364 reg.exe 3292 reg.exe 1288 reg.exe 3900 reg.exe 2116 reg.exe 2192 reg.exe 1492 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2220 2288274507c221f12776ff15b93d303a.exe 2220 2288274507c221f12776ff15b93d303a.exe 2956 2288274507c221f12776ff15b93d303a.exe 2956 2288274507c221f12776ff15b93d303a.exe 2492 2288274507c221f12776ff15b93d303a.exe 2492 2288274507c221f12776ff15b93d303a.exe 2408 2288274507c221f12776ff15b93d303a.exe 2408 2288274507c221f12776ff15b93d303a.exe 776 2288274507c221f12776ff15b93d303a.exe 776 2288274507c221f12776ff15b93d303a.exe 1436 2288274507c221f12776ff15b93d303a.exe 1436 2288274507c221f12776ff15b93d303a.exe 2344 Process not Found 2344 Process not Found 2136 WerFault.exe 2136 WerFault.exe 2948 2288274507c221f12776ff15b93d303a.exe 2948 2288274507c221f12776ff15b93d303a.exe 1336 2288274507c221f12776ff15b93d303a.exe 1336 2288274507c221f12776ff15b93d303a.exe 976 conhost.exe 976 conhost.exe 840 conhost.exe 840 conhost.exe 1648 conhost.exe 1648 conhost.exe 800 cmd.exe 800 cmd.exe 2244 conhost.exe 2244 conhost.exe 1208 2288274507c221f12776ff15b93d303a.exe 1208 2288274507c221f12776ff15b93d303a.exe 2724 2288274507c221f12776ff15b93d303a.exe 2724 2288274507c221f12776ff15b93d303a.exe 2868 conhost.exe 2868 conhost.exe 928 2288274507c221f12776ff15b93d303a.exe 928 2288274507c221f12776ff15b93d303a.exe 1156 2288274507c221f12776ff15b93d303a.exe 1156 2288274507c221f12776ff15b93d303a.exe 1560 2288274507c221f12776ff15b93d303a.exe 1560 2288274507c221f12776ff15b93d303a.exe 2976 reg.exe 2976 reg.exe 2408 2288274507c221f12776ff15b93d303a.exe 2408 2288274507c221f12776ff15b93d303a.exe 1716 reg.exe 1716 reg.exe 2276 2288274507c221f12776ff15b93d303a.exe 2276 2288274507c221f12776ff15b93d303a.exe 1172 cmd.exe 1172 cmd.exe 368 2288274507c221f12776ff15b93d303a.exe 368 2288274507c221f12776ff15b93d303a.exe 2800 cmd.exe 2800 cmd.exe 576 conhost.exe 576 conhost.exe 1988 conhost.exe 1988 conhost.exe 1436 conhost.exe 1436 conhost.exe 2012 2288274507c221f12776ff15b93d303a.exe 2012 2288274507c221f12776ff15b93d303a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2084 QsYEkIQQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe 2084 QsYEkIQQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2084 2220 2288274507c221f12776ff15b93d303a.exe 28 PID 2220 wrote to memory of 2084 2220 2288274507c221f12776ff15b93d303a.exe 28 PID 2220 wrote to memory of 2084 2220 2288274507c221f12776ff15b93d303a.exe 28 PID 2220 wrote to memory of 2084 2220 2288274507c221f12776ff15b93d303a.exe 28 PID 2220 wrote to memory of 2740 2220 2288274507c221f12776ff15b93d303a.exe 29 PID 2220 wrote to memory of 2740 2220 2288274507c221f12776ff15b93d303a.exe 29 PID 2220 wrote to memory of 2740 2220 2288274507c221f12776ff15b93d303a.exe 29 PID 2220 wrote to memory of 2740 2220 2288274507c221f12776ff15b93d303a.exe 29 PID 2220 wrote to memory of 2676 2220 2288274507c221f12776ff15b93d303a.exe 31 PID 2220 wrote to memory of 2676 2220 2288274507c221f12776ff15b93d303a.exe 31 PID 2220 wrote to memory of 2676 2220 2288274507c221f12776ff15b93d303a.exe 31 PID 2220 wrote to memory of 2676 2220 2288274507c221f12776ff15b93d303a.exe 31 PID 2676 wrote to memory of 2956 2676 cmd.exe 34 PID 2676 wrote to memory of 2956 2676 cmd.exe 34 PID 2676 wrote to memory of 2956 2676 cmd.exe 34 PID 2676 wrote to memory of 2956 2676 cmd.exe 34 PID 2220 wrote to memory of 2944 2220 2288274507c221f12776ff15b93d303a.exe 33 PID 2220 wrote to memory of 2944 2220 2288274507c221f12776ff15b93d303a.exe 33 PID 2220 wrote to memory of 2944 2220 2288274507c221f12776ff15b93d303a.exe 33 PID 2220 wrote to memory of 2944 2220 2288274507c221f12776ff15b93d303a.exe 33 PID 2220 wrote to memory of 2580 2220 2288274507c221f12776ff15b93d303a.exe 35 PID 2220 wrote to memory of 2580 2220 2288274507c221f12776ff15b93d303a.exe 35 PID 2220 wrote to memory of 2580 2220 2288274507c221f12776ff15b93d303a.exe 35 PID 2220 wrote to memory of 2580 2220 2288274507c221f12776ff15b93d303a.exe 35 PID 2220 wrote to memory of 2952 2220 2288274507c221f12776ff15b93d303a.exe 39 PID 2220 wrote to memory of 2952 2220 2288274507c221f12776ff15b93d303a.exe 39 PID 2220 wrote to memory of 2952 2220 2288274507c221f12776ff15b93d303a.exe 39 PID 2220 wrote to memory of 2952 2220 2288274507c221f12776ff15b93d303a.exe 39 PID 2956 wrote to memory of 1988 2956 2288274507c221f12776ff15b93d303a.exe 40 PID 2956 wrote to memory of 1988 2956 2288274507c221f12776ff15b93d303a.exe 40 PID 2956 wrote to memory of 1988 2956 2288274507c221f12776ff15b93d303a.exe 40 PID 2956 wrote to memory of 1988 2956 2288274507c221f12776ff15b93d303a.exe 40 PID 2956 wrote to memory of 1716 2956 2288274507c221f12776ff15b93d303a.exe 42 PID 2956 wrote to memory of 1716 2956 2288274507c221f12776ff15b93d303a.exe 42 PID 2956 wrote to memory of 1716 2956 2288274507c221f12776ff15b93d303a.exe 42 PID 2956 wrote to memory of 1716 2956 2288274507c221f12776ff15b93d303a.exe 42 PID 1988 wrote to memory of 2492 1988 cmd.exe 44 PID 1988 wrote to memory of 2492 1988 cmd.exe 44 PID 1988 wrote to memory of 2492 1988 cmd.exe 44 PID 1988 wrote to memory of 2492 1988 cmd.exe 44 PID 2956 wrote to memory of 1432 2956 2288274507c221f12776ff15b93d303a.exe 43 PID 2956 wrote to memory of 1432 2956 2288274507c221f12776ff15b93d303a.exe 43 PID 2956 wrote to memory of 1432 2956 2288274507c221f12776ff15b93d303a.exe 43 PID 2956 wrote to memory of 1432 2956 2288274507c221f12776ff15b93d303a.exe 43 PID 2956 wrote to memory of 1448 2956 2288274507c221f12776ff15b93d303a.exe 46 PID 2956 wrote to memory of 1448 2956 2288274507c221f12776ff15b93d303a.exe 46 PID 2956 wrote to memory of 1448 2956 2288274507c221f12776ff15b93d303a.exe 46 PID 2956 wrote to memory of 1448 2956 2288274507c221f12776ff15b93d303a.exe 46 PID 2956 wrote to memory of 1332 2956 2288274507c221f12776ff15b93d303a.exe 47 PID 2956 wrote to memory of 1332 2956 2288274507c221f12776ff15b93d303a.exe 47 PID 2956 wrote to memory of 1332 2956 2288274507c221f12776ff15b93d303a.exe 47 PID 2956 wrote to memory of 1332 2956 2288274507c221f12776ff15b93d303a.exe 47 PID 2492 wrote to memory of 2444 2492 Process not Found 51 PID 2492 wrote to memory of 2444 2492 Process not Found 51 PID 2492 wrote to memory of 2444 2492 Process not Found 51 PID 2492 wrote to memory of 2444 2492 Process not Found 51 PID 1332 wrote to memory of 2912 1332 cmd.exe 53 PID 1332 wrote to memory of 2912 1332 cmd.exe 53 PID 1332 wrote to memory of 2912 1332 cmd.exe 53 PID 1332 wrote to memory of 2912 1332 cmd.exe 53 PID 2444 wrote to memory of 2408 2444 cmd.exe 54 PID 2444 wrote to memory of 2408 2444 cmd.exe 54 PID 2444 wrote to memory of 2408 2444 cmd.exe 54 PID 2444 wrote to memory of 2408 2444 cmd.exe 54 -
System policy modification 1 TTPs 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2288274507c221f12776ff15b93d303a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2288274507c221f12776ff15b93d303a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2288274507c221f12776ff15b93d303a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2288274507c221f12776ff15b93d303a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exe"C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\PqocwIIY\QsYEkIQQ.exe"C:\Users\Admin\PqocwIIY\QsYEkIQQ.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2084
-
-
C:\ProgramData\gMEwIMUM\ZOkkgYYw.exe"C:\ProgramData\gMEwIMUM\ZOkkgYYw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2740
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"2⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"4⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"6⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"8⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a9⤵
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"10⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a11⤵PID:1436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"12⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a13⤵PID:2344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"14⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a15⤵PID:2136
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"16⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"18⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a19⤵PID:1336
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"20⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a21⤵PID:976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"22⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a23⤵PID:840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"24⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a25⤵PID:1648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"26⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a27⤵PID:1724
-
C:\Users\Admin\CIcMkwMU\oQwAEgwo.exe"C:\Users\Admin\CIcMkwMU\oQwAEgwo.exe"28⤵PID:2960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 12429⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
-
C:\ProgramData\PosEAMAc\WUsgIgoY.exe"C:\ProgramData\PosEAMAc\WUsgIgoY.exe"28⤵PID:1888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 9229⤵
- Program crash
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"28⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a29⤵PID:800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"30⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a31⤵PID:2244
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"32⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"34⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"36⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a37⤵PID:2868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"38⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a39⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:928 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"40⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"42⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
- Modifies registry key
PID:2592
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵PID:1872
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PgAMUoYw.bat" "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exe""44⤵PID:1960
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵PID:1056
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zeogkgkg.bat" "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exe""42⤵PID:888
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵PID:2708
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- Modifies registry key
PID:1940
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵PID:944
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵PID:560
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵PID:2272
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵PID:616
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵PID:2368
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uigwQcUY.bat" "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exe""40⤵PID:1884
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵PID:2448
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵PID:1728
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵PID:948
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵PID:2580
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OsUcsEAs.bat" "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exe""38⤵PID:2744
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵PID:2892
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵PID:2344
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵PID:2608
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵
- Modifies registry key
PID:1588
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kkEYQAYU.bat" "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exe""36⤵PID:1448
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:2596
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵PID:888
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DMEcYUAE.bat" "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exe""34⤵PID:1696
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:2592
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵PID:2252
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵PID:2412
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵PID:972
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵PID:2008
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵PID:756
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\xKsEkwQo.bat" "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exe""32⤵PID:3024
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:932
-
-
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a32⤵PID:704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"33⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a34⤵PID:976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"35⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a36⤵
- Modifies visibility of file extensions in Explorer
PID:1324 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a38⤵PID:1468
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"39⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a40⤵PID:2464
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"41⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a42⤵PID:112
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"43⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a44⤵PID:2964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"45⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a46⤵PID:1724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"47⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a48⤵PID:884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"49⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a50⤵PID:1020
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"51⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a52⤵PID:1584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"53⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a54⤵PID:1364
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"55⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a56⤵PID:2552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"57⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a58⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"59⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a60⤵
- Suspicious behavior: EnumeratesProcesses
PID:368 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"61⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a62⤵
- Modifies visibility of file extensions in Explorer
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"63⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a64⤵PID:2056
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"65⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a66⤵PID:1876
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"67⤵
- Modifies visibility of file extensions in Explorer
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a68⤵PID:472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"69⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a70⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:972 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"71⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a72⤵
- Checks whether UAC is enabled
- System policy modification
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"73⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a74⤵PID:2032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"75⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a76⤵PID:1640
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"77⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a78⤵PID:592
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"79⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a80⤵PID:896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"81⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a82⤵PID:1884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"83⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a84⤵PID:2148
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"85⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a86⤵PID:2624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"87⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a88⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1168 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"89⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a90⤵
- Modifies visibility of file extensions in Explorer
PID:548 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"91⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a92⤵PID:2156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"93⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a94⤵PID:2224
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"95⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a96⤵PID:1792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"97⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a98⤵PID:3200
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"99⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a100⤵PID:3372
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"101⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a102⤵PID:3668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"103⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a104⤵PID:3856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"105⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a106⤵PID:2712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"107⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a108⤵PID:3344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"109⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a110⤵PID:3452
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"111⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a112⤵PID:3984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"113⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a114⤵PID:3156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"115⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a116⤵PID:3408
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"117⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a118⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"119⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a120⤵PID:1804
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a"121⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a.exeC:\Users\Admin\AppData\Local\Temp\2288274507c221f12776ff15b93d303a122⤵PID:3436
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-