Analysis
-
max time kernel
110s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 05:33
Behavioral task
behavioral1
Sample
860f79829b2de0b373b5f537b530069a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
860f79829b2de0b373b5f537b530069a.exe
Resource
win10v2004-20231215-en
General
-
Target
860f79829b2de0b373b5f537b530069a.exe
-
Size
14KB
-
MD5
860f79829b2de0b373b5f537b530069a
-
SHA1
ee3ebbb54d8a55a4e15dc5afb971b291879e5a38
-
SHA256
04ac3839611bcdc7e4cfd3e09545df225e086752323da1f7454f5247903831ce
-
SHA512
eea9582d80b2847e3c5e44c4c40f06626047be8d7f7b1d6847c971ad92a21b5bea2c9080ed71e36ea986fc31356841a98a9d0fde1514782d9ad2dc844a5c7e5b
-
SSDEEP
384:VbI4o759HCTaamTCpqbNOo+tI/VQgLYgiPo252HbB:VbIX75oTatCoNOrt9gLY/T2Hb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\windows\\system32\\860f79829b2de0b373b5f537b530069a.exe" 860f79829b2de0b373b5f537b530069a.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 860f79829b2de0b373b5f537b530069a.exe -
Executes dropped EXE 64 IoCs
pid Process 2956 860f79829b2de0b373b5f537b530069a.exe 492 860f79829b2de0b373b5f537b530069a.exe 1996 860f79829b2de0b373b5f537b530069a.exe 2408 860f79829b2de0b373b5f537b530069a.exe 4612 860f79829b2de0b373b5f537b530069a.exe 3324 860f79829b2de0b373b5f537b530069a.exe 2644 860f79829b2de0b373b5f537b530069a.exe 2528 860f79829b2de0b373b5f537b530069a.exe 5052 860f79829b2de0b373b5f537b530069a.exe 4104 860f79829b2de0b373b5f537b530069a.exe 2860 860f79829b2de0b373b5f537b530069a.exe 3616 860f79829b2de0b373b5f537b530069a.exe 1948 860f79829b2de0b373b5f537b530069a.exe 4804 860f79829b2de0b373b5f537b530069a.exe 3312 860f79829b2de0b373b5f537b530069a.exe 220 860f79829b2de0b373b5f537b530069a.exe 4088 860f79829b2de0b373b5f537b530069a.exe 1692 860f79829b2de0b373b5f537b530069a.exe 3776 860f79829b2de0b373b5f537b530069a.exe 1712 860f79829b2de0b373b5f537b530069a.exe 3500 860f79829b2de0b373b5f537b530069a.exe 2604 860f79829b2de0b373b5f537b530069a.exe 2956 860f79829b2de0b373b5f537b530069a.exe 1676 860f79829b2de0b373b5f537b530069a.exe 3836 860f79829b2de0b373b5f537b530069a.exe 2512 860f79829b2de0b373b5f537b530069a.exe 2908 860f79829b2de0b373b5f537b530069a.exe 2988 860f79829b2de0b373b5f537b530069a.exe 1944 860f79829b2de0b373b5f537b530069a.exe 2644 860f79829b2de0b373b5f537b530069a.exe 3172 860f79829b2de0b373b5f537b530069a.exe 2964 860f79829b2de0b373b5f537b530069a.exe 5088 860f79829b2de0b373b5f537b530069a.exe 2572 860f79829b2de0b373b5f537b530069a.exe 4680 860f79829b2de0b373b5f537b530069a.exe 644 860f79829b2de0b373b5f537b530069a.exe 456 860f79829b2de0b373b5f537b530069a.exe 4804 860f79829b2de0b373b5f537b530069a.exe 1188 860f79829b2de0b373b5f537b530069a.exe 568 860f79829b2de0b373b5f537b530069a.exe 1748 860f79829b2de0b373b5f537b530069a.exe 384 860f79829b2de0b373b5f537b530069a.exe 1568 860f79829b2de0b373b5f537b530069a.exe 2044 860f79829b2de0b373b5f537b530069a.exe 3356 860f79829b2de0b373b5f537b530069a.exe 4632 860f79829b2de0b373b5f537b530069a.exe 3496 860f79829b2de0b373b5f537b530069a.exe 4276 860f79829b2de0b373b5f537b530069a.exe 352 860f79829b2de0b373b5f537b530069a.exe 640 860f79829b2de0b373b5f537b530069a.exe 2128 860f79829b2de0b373b5f537b530069a.exe 4904 860f79829b2de0b373b5f537b530069a.exe 4876 860f79829b2de0b373b5f537b530069a.exe 4012 860f79829b2de0b373b5f537b530069a.exe 3520 860f79829b2de0b373b5f537b530069a.exe 2660 860f79829b2de0b373b5f537b530069a.exe 1624 860f79829b2de0b373b5f537b530069a.exe 3088 860f79829b2de0b373b5f537b530069a.exe 3376 860f79829b2de0b373b5f537b530069a.exe 4476 860f79829b2de0b373b5f537b530069a.exe 3528 860f79829b2de0b373b5f537b530069a.exe 3200 860f79829b2de0b373b5f537b530069a.exe 3736 860f79829b2de0b373b5f537b530069a.exe 1404 860f79829b2de0b373b5f537b530069a.exe -
resource yara_rule behavioral2/memory/4728-0-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/files/0x000600000002312e-6.dat upx behavioral2/memory/4728-33-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/2956-41-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/2988-138-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/568-164-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/1568-169-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/4632-233-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File created C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe File opened for modification C:\windows\SysWOW64\ZTLog.dat 860f79829b2de0b373b5f537b530069a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 860f79829b2de0b373b5f537b530069a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 2956 4728 860f79829b2de0b373b5f537b530069a.exe 84 PID 4728 wrote to memory of 2956 4728 860f79829b2de0b373b5f537b530069a.exe 84 PID 4728 wrote to memory of 2956 4728 860f79829b2de0b373b5f537b530069a.exe 84 PID 2956 wrote to memory of 492 2956 860f79829b2de0b373b5f537b530069a.exe 85 PID 2956 wrote to memory of 492 2956 860f79829b2de0b373b5f537b530069a.exe 85 PID 2956 wrote to memory of 492 2956 860f79829b2de0b373b5f537b530069a.exe 85 PID 492 wrote to memory of 1996 492 860f79829b2de0b373b5f537b530069a.exe 86 PID 492 wrote to memory of 1996 492 860f79829b2de0b373b5f537b530069a.exe 86 PID 492 wrote to memory of 1996 492 860f79829b2de0b373b5f537b530069a.exe 86 PID 1996 wrote to memory of 2408 1996 860f79829b2de0b373b5f537b530069a.exe 87 PID 1996 wrote to memory of 2408 1996 860f79829b2de0b373b5f537b530069a.exe 87 PID 1996 wrote to memory of 2408 1996 860f79829b2de0b373b5f537b530069a.exe 87 PID 2408 wrote to memory of 4612 2408 860f79829b2de0b373b5f537b530069a.exe 88 PID 2408 wrote to memory of 4612 2408 860f79829b2de0b373b5f537b530069a.exe 88 PID 2408 wrote to memory of 4612 2408 860f79829b2de0b373b5f537b530069a.exe 88 PID 4612 wrote to memory of 3324 4612 860f79829b2de0b373b5f537b530069a.exe 91 PID 4612 wrote to memory of 3324 4612 860f79829b2de0b373b5f537b530069a.exe 91 PID 4612 wrote to memory of 3324 4612 860f79829b2de0b373b5f537b530069a.exe 91 PID 3324 wrote to memory of 2644 3324 860f79829b2de0b373b5f537b530069a.exe 93 PID 3324 wrote to memory of 2644 3324 860f79829b2de0b373b5f537b530069a.exe 93 PID 3324 wrote to memory of 2644 3324 860f79829b2de0b373b5f537b530069a.exe 93 PID 2644 wrote to memory of 2528 2644 860f79829b2de0b373b5f537b530069a.exe 95 PID 2644 wrote to memory of 2528 2644 860f79829b2de0b373b5f537b530069a.exe 95 PID 2644 wrote to memory of 2528 2644 860f79829b2de0b373b5f537b530069a.exe 95 PID 2528 wrote to memory of 5052 2528 860f79829b2de0b373b5f537b530069a.exe 96 PID 2528 wrote to memory of 5052 2528 860f79829b2de0b373b5f537b530069a.exe 96 PID 2528 wrote to memory of 5052 2528 860f79829b2de0b373b5f537b530069a.exe 96 PID 5052 wrote to memory of 4104 5052 860f79829b2de0b373b5f537b530069a.exe 98 PID 5052 wrote to memory of 4104 5052 860f79829b2de0b373b5f537b530069a.exe 98 PID 5052 wrote to memory of 4104 5052 860f79829b2de0b373b5f537b530069a.exe 98 PID 4104 wrote to memory of 2860 4104 860f79829b2de0b373b5f537b530069a.exe 99 PID 4104 wrote to memory of 2860 4104 860f79829b2de0b373b5f537b530069a.exe 99 PID 4104 wrote to memory of 2860 4104 860f79829b2de0b373b5f537b530069a.exe 99 PID 2860 wrote to memory of 3616 2860 860f79829b2de0b373b5f537b530069a.exe 100 PID 2860 wrote to memory of 3616 2860 860f79829b2de0b373b5f537b530069a.exe 100 PID 2860 wrote to memory of 3616 2860 860f79829b2de0b373b5f537b530069a.exe 100 PID 3616 wrote to memory of 1948 3616 860f79829b2de0b373b5f537b530069a.exe 102 PID 3616 wrote to memory of 1948 3616 860f79829b2de0b373b5f537b530069a.exe 102 PID 3616 wrote to memory of 1948 3616 860f79829b2de0b373b5f537b530069a.exe 102 PID 1948 wrote to memory of 4804 1948 860f79829b2de0b373b5f537b530069a.exe 104 PID 1948 wrote to memory of 4804 1948 860f79829b2de0b373b5f537b530069a.exe 104 PID 1948 wrote to memory of 4804 1948 860f79829b2de0b373b5f537b530069a.exe 104 PID 4804 wrote to memory of 3312 4804 860f79829b2de0b373b5f537b530069a.exe 105 PID 4804 wrote to memory of 3312 4804 860f79829b2de0b373b5f537b530069a.exe 105 PID 4804 wrote to memory of 3312 4804 860f79829b2de0b373b5f537b530069a.exe 105 PID 3312 wrote to memory of 220 3312 860f79829b2de0b373b5f537b530069a.exe 106 PID 3312 wrote to memory of 220 3312 860f79829b2de0b373b5f537b530069a.exe 106 PID 3312 wrote to memory of 220 3312 860f79829b2de0b373b5f537b530069a.exe 106 PID 220 wrote to memory of 4088 220 860f79829b2de0b373b5f537b530069a.exe 107 PID 220 wrote to memory of 4088 220 860f79829b2de0b373b5f537b530069a.exe 107 PID 220 wrote to memory of 4088 220 860f79829b2de0b373b5f537b530069a.exe 107 PID 4088 wrote to memory of 1692 4088 860f79829b2de0b373b5f537b530069a.exe 108 PID 4088 wrote to memory of 1692 4088 860f79829b2de0b373b5f537b530069a.exe 108 PID 4088 wrote to memory of 1692 4088 860f79829b2de0b373b5f537b530069a.exe 108 PID 1692 wrote to memory of 3776 1692 860f79829b2de0b373b5f537b530069a.exe 110 PID 1692 wrote to memory of 3776 1692 860f79829b2de0b373b5f537b530069a.exe 110 PID 1692 wrote to memory of 3776 1692 860f79829b2de0b373b5f537b530069a.exe 110 PID 3776 wrote to memory of 1712 3776 860f79829b2de0b373b5f537b530069a.exe 111 PID 3776 wrote to memory of 1712 3776 860f79829b2de0b373b5f537b530069a.exe 111 PID 3776 wrote to memory of 1712 3776 860f79829b2de0b373b5f537b530069a.exe 111 PID 1712 wrote to memory of 3500 1712 860f79829b2de0b373b5f537b530069a.exe 112 PID 1712 wrote to memory of 3500 1712 860f79829b2de0b373b5f537b530069a.exe 112 PID 1712 wrote to memory of 3500 1712 860f79829b2de0b373b5f537b530069a.exe 112 PID 3500 wrote to memory of 2604 3500 860f79829b2de0b373b5f537b530069a.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\860f79829b2de0b373b5f537b530069a.exe"C:\Users\Admin\AppData\Local\Temp\860f79829b2de0b373b5f537b530069a.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:492 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"6⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"7⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"9⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"10⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"13⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"14⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"15⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"17⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:220 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"20⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"22⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"23⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2604 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"24⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2956 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"25⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1676 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"26⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
PID:3836 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"27⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2512 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"28⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2908 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2988 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1944 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"31⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
PID:2644 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3172 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"33⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
PID:2964 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"34⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
PID:5088 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2572 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"36⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies registry class
PID:4680 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"37⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies registry class
PID:644 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"38⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:456 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4804 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"40⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1188 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:568 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1748 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"43⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:384 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"44⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1568 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"45⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2044 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"46⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
PID:3356 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4632 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"48⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3496 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"49⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4276 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:352 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"51⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:640 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"52⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
PID:2128 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"53⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4904 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4876 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"55⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4012 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"56⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3520 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2660 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"58⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1624 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"59⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3088 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"60⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3376 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"61⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4476 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"62⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3528 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3200 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"64⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
PID:3736 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"65⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1404 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"66⤵
- Drops file in System32 directory
- Modifies registry class
PID:4548 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"67⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5004 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"68⤵
- Modifies WinLogon for persistence
- Checks computer location settings
PID:4128 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"69⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2412 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"70⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4736 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"71⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
PID:2100 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"72⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Modifies registry class
PID:1928 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"73⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1568 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"74⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2044 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"75⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Modifies registry class
PID:4480 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"76⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
PID:4632 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"77⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
PID:4756 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"78⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2716 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"79⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4912 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"80⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4672 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"81⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Modifies registry class
PID:1676 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"82⤵PID:1552
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"83⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
PID:1856 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"84⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1208 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"85⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4716 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"86⤵PID:1488
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"87⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Modifies registry class
PID:1936 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"88⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
PID:4344 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"89⤵
- Modifies WinLogon for persistence
- Checks computer location settings
PID:1276 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"90⤵
- Modifies WinLogon for persistence
- Modifies registry class
PID:3172 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"91⤵
- Checks computer location settings
- Modifies registry class
PID:4668 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"92⤵
- Drops file in System32 directory
PID:3448 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"93⤵PID:4984
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"94⤵PID:4680
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"95⤵PID:4008
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"96⤵PID:1520
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"97⤵PID:5040
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"98⤵PID:3104
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"99⤵PID:2244
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"100⤵PID:1916
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"101⤵PID:4684
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"102⤵PID:3308
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"103⤵PID:2364
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"104⤵PID:588
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"105⤵PID:936
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"106⤵PID:3852
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"107⤵PID:5008
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"108⤵PID:60
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"109⤵PID:4276
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"110⤵PID:4500
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"111⤵PID:1892
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"112⤵PID:4628
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:1552 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"114⤵PID:4492
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"115⤵PID:2312
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"116⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1488 -
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"117⤵PID:2644
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"118⤵PID:3268
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"119⤵PID:3320
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"120⤵PID:2520
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"121⤵PID:4388
-
C:\windows\SysWOW64\860f79829b2de0b373b5f537b530069a.exe"C:\windows\system32\860f79829b2de0b373b5f537b530069a.exe"122⤵PID:2184
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-