Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 09:38
Static task
static1
Behavioral task
behavioral1
Sample
eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe
Resource
win10v2004-20240426-en
General
-
Target
eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe
-
Size
199KB
-
MD5
15777ca5795c1fda5dd42a1c496276cf
-
SHA1
c678051bbbce4f3f5c51bf7be1f3f0b55d5bf6a5
-
SHA256
eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea
-
SHA512
0bca1ea50e2c11ddb69b1c6d6af6bd14e45ba8ddb9e7f63322508cdc4495ba72e692bfa627a75dc4ff40df36ae96eede2438edda056a9e8df5eb041eb4238390
-
SSDEEP
3072:8pI0BOF3oO0fbttcHbYswnGxmgV/kEIaPkzdOYfebP8QZA2nz7:8q0BOFUfrc7YnMmgV/XFy4SQZlnz7
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
muoocYMc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\Geo\Nation muoocYMc.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 940 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
muoocYMc.exeOeIoAoIw.exepid process 2024 muoocYMc.exe 2516 OeIoAoIw.exe -
Loads dropped DLL 20 IoCs
Processes:
eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exemuoocYMc.exepid process 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exemuoocYMc.exeOeIoAoIw.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DOUEUMMI.exe = "C:\\ProgramData\\GcoIoYYQ\\DOUEUMMI.exe" eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\muoocYMc.exe = "C:\\Users\\Admin\\ZCMEAUEY\\muoocYMc.exe" eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OeIoAoIw.exe = "C:\\ProgramData\\cIUcQccQ\\OeIoAoIw.exe" eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\muoocYMc.exe = "C:\\Users\\Admin\\ZCMEAUEY\\muoocYMc.exe" muoocYMc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OeIoAoIw.exe = "C:\\ProgramData\\cIUcQccQ\\OeIoAoIw.exe" OeIoAoIw.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\NugkQwso.exe = "C:\\Users\\Admin\\bAwoMkQU\\NugkQwso.exe" eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2748 2876 WerFault.exe NugkQwso.exe 896 2020 WerFault.exe DOUEUMMI.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1976 reg.exe 1520 reg.exe 900 reg.exe 2000 reg.exe 2312 reg.exe 1016 reg.exe 2588 reg.exe 2876 reg.exe 2620 reg.exe 572 reg.exe 1552 reg.exe 2676 reg.exe 2992 reg.exe 1224 reg.exe 2316 reg.exe 944 reg.exe 928 reg.exe 2168 reg.exe 300 reg.exe 2188 reg.exe 2792 reg.exe 2772 reg.exe 2664 reg.exe 2300 reg.exe 2908 reg.exe 2936 reg.exe 1644 reg.exe 2792 reg.exe 2532 reg.exe 2816 reg.exe 972 reg.exe 2936 reg.exe 2380 reg.exe 2628 reg.exe 2260 reg.exe 2556 reg.exe 1868 reg.exe 1592 reg.exe 888 reg.exe 2276 reg.exe 2604 reg.exe 2984 reg.exe 2240 reg.exe 2768 reg.exe 2432 reg.exe 676 reg.exe 2648 reg.exe 3068 reg.exe 1976 reg.exe 576 reg.exe 1576 reg.exe 588 reg.exe 1300 reg.exe 1692 reg.exe 2536 reg.exe 2460 reg.exe 2320 reg.exe 2240 reg.exe 2088 reg.exe 2260 reg.exe 2552 reg.exe 2916 reg.exe 1920 reg.exe 2948 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exepid process 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1020 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1020 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2028 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2028 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2764 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2764 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1964 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1964 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2184 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2184 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2568 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2568 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1524 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1524 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 944 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 944 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1100 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1100 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2780 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2780 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1540 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1540 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2424 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2424 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2484 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2484 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1860 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1860 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1660 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1660 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1352 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1352 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1764 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1764 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1644 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1644 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2264 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2264 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2676 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2676 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1860 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1860 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2052 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2052 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 616 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 616 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2232 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2232 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2628 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2628 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 564 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 564 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2192 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2192 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2772 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2772 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1920 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 1920 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2432 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe 2432 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
muoocYMc.exepid process 2024 muoocYMc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
muoocYMc.exepid process 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe 2024 muoocYMc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.execmd.execmd.exeeb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.execmd.execmd.exedescription pid process target process PID 2068 wrote to memory of 2024 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe muoocYMc.exe PID 2068 wrote to memory of 2024 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe muoocYMc.exe PID 2068 wrote to memory of 2024 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe muoocYMc.exe PID 2068 wrote to memory of 2024 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe muoocYMc.exe PID 2068 wrote to memory of 2516 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe OeIoAoIw.exe PID 2068 wrote to memory of 2516 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe OeIoAoIw.exe PID 2068 wrote to memory of 2516 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe OeIoAoIw.exe PID 2068 wrote to memory of 2516 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe OeIoAoIw.exe PID 2068 wrote to memory of 2756 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2068 wrote to memory of 2756 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2068 wrote to memory of 2756 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2068 wrote to memory of 2756 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2068 wrote to memory of 2648 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2068 wrote to memory of 2648 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2068 wrote to memory of 2648 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2068 wrote to memory of 2648 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2756 wrote to memory of 2620 2756 cmd.exe eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe PID 2756 wrote to memory of 2620 2756 cmd.exe eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe PID 2756 wrote to memory of 2620 2756 cmd.exe eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe PID 2756 wrote to memory of 2620 2756 cmd.exe eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe PID 2068 wrote to memory of 2720 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2068 wrote to memory of 2720 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2068 wrote to memory of 2720 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2068 wrote to memory of 2720 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2068 wrote to memory of 2844 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2068 wrote to memory of 2844 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2068 wrote to memory of 2844 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2068 wrote to memory of 2844 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2068 wrote to memory of 2572 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2068 wrote to memory of 2572 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2068 wrote to memory of 2572 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2068 wrote to memory of 2572 2068 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2572 wrote to memory of 2388 2572 cmd.exe cscript.exe PID 2572 wrote to memory of 2388 2572 cmd.exe cscript.exe PID 2572 wrote to memory of 2388 2572 cmd.exe cscript.exe PID 2572 wrote to memory of 2388 2572 cmd.exe cscript.exe PID 2620 wrote to memory of 588 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2620 wrote to memory of 588 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2620 wrote to memory of 588 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2620 wrote to memory of 588 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2620 wrote to memory of 572 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2620 wrote to memory of 572 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2620 wrote to memory of 572 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2620 wrote to memory of 572 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 588 wrote to memory of 1020 588 cmd.exe eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe PID 588 wrote to memory of 1020 588 cmd.exe eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe PID 588 wrote to memory of 1020 588 cmd.exe eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe PID 588 wrote to memory of 1020 588 cmd.exe eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe PID 2620 wrote to memory of 1592 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2620 wrote to memory of 1592 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2620 wrote to memory of 1592 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2620 wrote to memory of 1592 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2620 wrote to memory of 1576 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2620 wrote to memory of 1576 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2620 wrote to memory of 1576 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2620 wrote to memory of 1576 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe reg.exe PID 2620 wrote to memory of 2872 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2620 wrote to memory of 2872 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2620 wrote to memory of 2872 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2620 wrote to memory of 2872 2620 eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe cmd.exe PID 2872 wrote to memory of 1796 2872 cmd.exe cscript.exe PID 2872 wrote to memory of 1796 2872 cmd.exe cscript.exe PID 2872 wrote to memory of 1796 2872 cmd.exe cscript.exe PID 2872 wrote to memory of 1796 2872 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe"C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\ZCMEAUEY\muoocYMc.exe"C:\Users\Admin\ZCMEAUEY\muoocYMc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2024
-
-
C:\ProgramData\cIUcQccQ\OeIoAoIw.exe"C:\ProgramData\cIUcQccQ\OeIoAoIw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2516
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"2⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"4⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"6⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"8⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"10⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"12⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"14⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"16⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"18⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea19⤵
- Suspicious behavior: EnumeratesProcesses
PID:944 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"20⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"22⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"24⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"26⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"28⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"30⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"32⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"34⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"36⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"38⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"40⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"42⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"44⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"46⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"48⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea49⤵
- Suspicious behavior: EnumeratesProcesses
PID:616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"50⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"52⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"54⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea55⤵
- Suspicious behavior: EnumeratesProcesses
PID:564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"56⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"58⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"60⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"62⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"64⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea65⤵PID:2748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"66⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea67⤵PID:2728
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"68⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea69⤵PID:1120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"70⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea71⤵PID:2668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"72⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea73⤵PID:1552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"74⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea75⤵PID:1684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"76⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea77⤵PID:2916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"78⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea79⤵PID:2596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"80⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea81⤵PID:284
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"82⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea83⤵PID:2544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"84⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea85⤵PID:2276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"86⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea87⤵PID:2992
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"88⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea89⤵PID:3024
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"90⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea91⤵PID:2040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"92⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea93⤵PID:1088
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"94⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea95⤵PID:1512
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"96⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea97⤵PID:2112
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"98⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea99⤵PID:1980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"100⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea101⤵PID:1584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"102⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea103⤵PID:2140
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"104⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea105⤵PID:1436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"106⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea107⤵
- Adds Run key to start application
PID:2908 -
C:\Users\Admin\bAwoMkQU\NugkQwso.exe"C:\Users\Admin\bAwoMkQU\NugkQwso.exe"108⤵PID:2876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 36109⤵
- Program crash
PID:2748
-
-
-
C:\ProgramData\GcoIoYYQ\DOUEUMMI.exe"C:\ProgramData\GcoIoYYQ\DOUEUMMI.exe"108⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 36109⤵
- Program crash
PID:896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"108⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea109⤵PID:616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"110⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea111⤵PID:1380
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"112⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea113⤵PID:1580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"114⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea115⤵PID:1660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"116⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea117⤵PID:2424
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"118⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea119⤵PID:2408
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"120⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea.exeC:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea121⤵PID:1104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea"122⤵PID:1072
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-