Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 18:23
Static task
static1
Behavioral task
behavioral1
Sample
082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe
Resource
win10v2004-20240426-en
General
-
Target
082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe
-
Size
273KB
-
MD5
455a7fabe1641afa6940f7537d7cee54
-
SHA1
dd544da1945c8ea26acd229eb8712378d0225227
-
SHA256
082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113
-
SHA512
8e7547c8d2e73f5e3b9ca65a0d80436d5e83dba239c03801e56a708c31952f857364d4a486de507c6e589072b01b38f28939401634e0728a7659bdd339b48238
-
SSDEEP
6144:jV0X5Gl3WlRYgwERjDuV7hOWC1ECIg6dY1c+V+th:je5xkyRjD2cWWHtaYy+0
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (64) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
VosoMMQA.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\Geo\Nation VosoMMQA.exe -
Executes dropped EXE 2 IoCs
Processes:
VosoMMQA.exelUQgoUsU.exepid process 2228 VosoMMQA.exe 2580 lUQgoUsU.exe -
Loads dropped DLL 20 IoCs
Processes:
082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeVosoMMQA.exepid process 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeVosoMMQA.exelUQgoUsU.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\VosoMMQA.exe = "C:\\Users\\Admin\\GCcQEEsY\\VosoMMQA.exe" 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lUQgoUsU.exe = "C:\\ProgramData\\mOUssUwk\\lUQgoUsU.exe" 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\VosoMMQA.exe = "C:\\Users\\Admin\\GCcQEEsY\\VosoMMQA.exe" VosoMMQA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lUQgoUsU.exe = "C:\\ProgramData\\mOUssUwk\\lUQgoUsU.exe" lUQgoUsU.exe -
Drops file in Windows directory 1 IoCs
Processes:
VosoMMQA.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico VosoMMQA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 2264 reg.exe 1696 reg.exe 2100 reg.exe 2744 reg.exe 1488 reg.exe 292 reg.exe 1968 reg.exe 760 reg.exe 2112 reg.exe 2584 reg.exe 2488 reg.exe 1900 reg.exe 1356 reg.exe 1076 reg.exe 1704 reg.exe 1756 reg.exe 2824 reg.exe 996 reg.exe 2488 reg.exe 2952 reg.exe 1996 reg.exe 2464 reg.exe 2260 reg.exe 2208 reg.exe 1748 reg.exe 2152 reg.exe 1940 reg.exe 1608 reg.exe 2540 reg.exe 580 reg.exe 2200 reg.exe 1484 reg.exe 1548 reg.exe 2072 reg.exe 2712 reg.exe 2444 reg.exe 376 reg.exe 1508 reg.exe 2280 reg.exe 804 reg.exe 320 reg.exe 396 reg.exe 1880 reg.exe 1372 reg.exe 2380 reg.exe 2084 reg.exe 772 reg.exe 2656 reg.exe 2084 reg.exe 2420 reg.exe 2964 reg.exe 1112 reg.exe 2016 reg.exe 2372 reg.exe 1752 reg.exe 1792 reg.exe 2328 reg.exe 1372 reg.exe 2180 reg.exe 2932 reg.exe 1696 reg.exe 1920 reg.exe 2460 reg.exe 2348 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exepid process 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2224 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2224 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1328 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1328 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 700 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 700 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1740 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1740 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2396 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2396 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2768 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2768 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1956 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1956 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1136 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1136 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1028 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1028 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2960 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2960 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2252 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2252 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2600 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2600 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1668 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1668 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2764 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2764 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 912 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 912 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1284 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1284 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2084 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2084 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2712 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2712 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 468 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 468 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2360 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2360 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2668 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2668 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1680 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1680 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2748 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2748 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2752 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2752 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1884 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1884 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2136 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2136 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1060 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1060 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2464 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2464 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1532 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 1532 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2492 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe 2492 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
VosoMMQA.exepid process 2228 VosoMMQA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
VosoMMQA.exepid process 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe 2228 VosoMMQA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.execmd.execmd.exe082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.execmd.execmd.exedescription pid process target process PID 1616 wrote to memory of 2228 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe VosoMMQA.exe PID 1616 wrote to memory of 2228 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe VosoMMQA.exe PID 1616 wrote to memory of 2228 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe VosoMMQA.exe PID 1616 wrote to memory of 2228 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe VosoMMQA.exe PID 1616 wrote to memory of 2580 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe lUQgoUsU.exe PID 1616 wrote to memory of 2580 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe lUQgoUsU.exe PID 1616 wrote to memory of 2580 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe lUQgoUsU.exe PID 1616 wrote to memory of 2580 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe lUQgoUsU.exe PID 1616 wrote to memory of 2732 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 1616 wrote to memory of 2732 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 1616 wrote to memory of 2732 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 1616 wrote to memory of 2732 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 2732 wrote to memory of 2620 2732 cmd.exe 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe PID 2732 wrote to memory of 2620 2732 cmd.exe 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe PID 2732 wrote to memory of 2620 2732 cmd.exe 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe PID 2732 wrote to memory of 2620 2732 cmd.exe 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe PID 1616 wrote to memory of 2612 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 1616 wrote to memory of 2612 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 1616 wrote to memory of 2612 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 1616 wrote to memory of 2612 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 1616 wrote to memory of 2300 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 1616 wrote to memory of 2300 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 1616 wrote to memory of 2300 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 1616 wrote to memory of 2300 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 1616 wrote to memory of 2728 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 1616 wrote to memory of 2728 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 1616 wrote to memory of 2728 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 1616 wrote to memory of 2728 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 1616 wrote to memory of 2508 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 1616 wrote to memory of 2508 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 1616 wrote to memory of 2508 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 1616 wrote to memory of 2508 1616 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 2508 wrote to memory of 2480 2508 cmd.exe cscript.exe PID 2508 wrote to memory of 2480 2508 cmd.exe cscript.exe PID 2508 wrote to memory of 2480 2508 cmd.exe cscript.exe PID 2508 wrote to memory of 2480 2508 cmd.exe cscript.exe PID 2620 wrote to memory of 1916 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 2620 wrote to memory of 1916 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 2620 wrote to memory of 1916 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 2620 wrote to memory of 1916 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 1916 wrote to memory of 2224 1916 cmd.exe 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe PID 1916 wrote to memory of 2224 1916 cmd.exe 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe PID 1916 wrote to memory of 2224 1916 cmd.exe 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe PID 1916 wrote to memory of 2224 1916 cmd.exe 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe PID 2620 wrote to memory of 1608 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 2620 wrote to memory of 1608 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 2620 wrote to memory of 1608 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 2620 wrote to memory of 1608 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 2620 wrote to memory of 1464 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 2620 wrote to memory of 1464 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 2620 wrote to memory of 1464 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 2620 wrote to memory of 1464 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 2620 wrote to memory of 2152 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 2620 wrote to memory of 2152 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 2620 wrote to memory of 2152 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 2620 wrote to memory of 2152 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe reg.exe PID 2620 wrote to memory of 2216 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 2620 wrote to memory of 2216 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 2620 wrote to memory of 2216 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 2620 wrote to memory of 2216 2620 082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe cmd.exe PID 2216 wrote to memory of 1920 2216 cmd.exe cscript.exe PID 2216 wrote to memory of 1920 2216 cmd.exe cscript.exe PID 2216 wrote to memory of 1920 2216 cmd.exe cscript.exe PID 2216 wrote to memory of 1920 2216 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe"C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\GCcQEEsY\VosoMMQA.exe"C:\Users\Admin\GCcQEEsY\VosoMMQA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2228
-
-
C:\ProgramData\mOUssUwk\lUQgoUsU.exe"C:\ProgramData\mOUssUwk\lUQgoUsU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2580
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"2⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f1133⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"4⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f1135⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"6⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f1137⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"8⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f1139⤵
- Suspicious behavior: EnumeratesProcesses
PID:700 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"10⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11311⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"12⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11313⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"14⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11315⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"16⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11317⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"18⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11319⤵
- Suspicious behavior: EnumeratesProcesses
PID:1136 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"20⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11321⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"22⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11323⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"24⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11325⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"26⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11327⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"28⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11329⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"30⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11331⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"32⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11333⤵
- Suspicious behavior: EnumeratesProcesses
PID:912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"34⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11335⤵
- Suspicious behavior: EnumeratesProcesses
PID:1284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"36⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11337⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"38⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11339⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"40⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11341⤵
- Suspicious behavior: EnumeratesProcesses
PID:468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"42⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11343⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"44⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11345⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"46⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11347⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"48⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11349⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"50⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11351⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"52⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11353⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"54⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11355⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"56⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11357⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"58⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11359⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"60⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11361⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"62⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11363⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"64⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11365⤵PID:1852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"66⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11367⤵PID:2916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"68⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11369⤵PID:2428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"70⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11371⤵PID:860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"72⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11373⤵PID:2680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"74⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11375⤵PID:1184
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"76⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11377⤵PID:2480
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"78⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11379⤵PID:2384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"80⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11381⤵PID:1136
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"82⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11383⤵PID:780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"84⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11385⤵PID:1256
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"86⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11387⤵PID:2720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"88⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11389⤵PID:2484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"90⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11391⤵PID:2540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"92⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11393⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"94⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11395⤵PID:3004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"96⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11397⤵PID:628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"98⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f11399⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"100⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113101⤵PID:2748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"102⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113103⤵PID:1516
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"104⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113105⤵PID:2092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"106⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113107⤵PID:2676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"108⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113109⤵PID:2340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"110⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113111⤵PID:2696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"112⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113113⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"114⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113115⤵PID:896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"116⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113117⤵PID:1264
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"118⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113119⤵PID:676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"120⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113.exeC:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113121⤵PID:2772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113"122⤵PID:2556
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-