Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe
Resource
win10v2004-20240508-en
General
-
Target
98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe
-
Size
117KB
-
MD5
b6862b585b36fabe2dfc59188bf8cb07
-
SHA1
7c25b7b864b2f5fed4f9f916664fe0446e27b797
-
SHA256
98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654
-
SHA512
b6258a0b4ce28aa8b15d83b9369e5d04533d0123a0e0823bdbf71908f5dbdc3383fe649bd9cbbae1cc472f623b852d4bd5075125d1bedaac3b12366912e4b59c
-
SSDEEP
3072:LcCzV5J5MeC0hivrhYtrS22tUb0XqiMa9mSg:LcyIYhSYlPQXP8n
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ueAkcosM.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\International\Geo\Nation ueAkcosM.exe -
Executes dropped EXE 2 IoCs
Processes:
ueAkcosM.exeOKoIUUsE.exepid process 2356 ueAkcosM.exe 1208 OKoIUUsE.exe -
Loads dropped DLL 20 IoCs
Processes:
98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeueAkcosM.exepid process 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeueAkcosM.exeOKoIUUsE.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\ueAkcosM.exe = "C:\\Users\\Admin\\hesAkUQQ\\ueAkcosM.exe" 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OKoIUUsE.exe = "C:\\ProgramData\\cUcYookg\\OKoIUUsE.exe" 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\ueAkcosM.exe = "C:\\Users\\Admin\\hesAkUQQ\\ueAkcosM.exe" ueAkcosM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OKoIUUsE.exe = "C:\\ProgramData\\cUcYookg\\OKoIUUsE.exe" OKoIUUsE.exe -
Drops file in Windows directory 1 IoCs
Processes:
ueAkcosM.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico ueAkcosM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 2432 reg.exe 2836 reg.exe 2916 reg.exe 684 reg.exe 2456 reg.exe 1556 reg.exe 1764 reg.exe 2200 reg.exe 2544 reg.exe 2408 reg.exe 1784 reg.exe 284 reg.exe 2372 reg.exe 2716 reg.exe 1636 reg.exe 684 reg.exe 2144 reg.exe 2540 reg.exe 2672 reg.exe 1588 reg.exe 1588 reg.exe 2460 reg.exe 564 reg.exe 1196 reg.exe 2544 reg.exe 1620 reg.exe 1064 reg.exe 1536 reg.exe 1676 reg.exe 1060 reg.exe 284 reg.exe 2760 reg.exe 1880 reg.exe 1248 reg.exe 2436 reg.exe 1552 reg.exe 856 reg.exe 1124 reg.exe 1852 reg.exe 2368 reg.exe 2560 reg.exe 2984 reg.exe 1772 reg.exe 2748 reg.exe 2336 reg.exe 924 reg.exe 856 reg.exe 2460 reg.exe 3052 reg.exe 1816 reg.exe 1740 reg.exe 2684 reg.exe 2772 reg.exe 888 reg.exe 324 reg.exe 912 reg.exe 2888 reg.exe 852 reg.exe 2056 reg.exe 2984 reg.exe 2636 reg.exe 2788 reg.exe 2740 reg.exe 1584 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exepid process 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2972 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2972 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2468 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2468 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 540 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 540 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1552 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1552 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 648 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 648 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2676 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2676 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2896 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2896 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1752 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1752 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2844 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2844 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 3064 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 3064 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2868 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2868 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2544 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2544 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2448 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2448 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2940 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2940 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1628 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1628 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1484 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1484 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1004 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1004 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2316 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2316 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1592 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1592 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1092 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1092 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1552 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1552 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2388 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2388 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1248 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 1248 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2744 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2744 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2096 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2096 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 940 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 940 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2912 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2912 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 852 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 852 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2788 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2788 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2076 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe 2076 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ueAkcosM.exepid process 2356 ueAkcosM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
ueAkcosM.exepid process 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe 2356 ueAkcosM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.execmd.execmd.exe98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.execmd.execmd.exedescription pid process target process PID 2028 wrote to memory of 2356 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe ueAkcosM.exe PID 2028 wrote to memory of 2356 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe ueAkcosM.exe PID 2028 wrote to memory of 2356 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe ueAkcosM.exe PID 2028 wrote to memory of 2356 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe ueAkcosM.exe PID 2028 wrote to memory of 1208 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe OKoIUUsE.exe PID 2028 wrote to memory of 1208 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe OKoIUUsE.exe PID 2028 wrote to memory of 1208 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe OKoIUUsE.exe PID 2028 wrote to memory of 1208 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe OKoIUUsE.exe PID 2028 wrote to memory of 2664 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2028 wrote to memory of 2664 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2028 wrote to memory of 2664 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2028 wrote to memory of 2664 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2664 wrote to memory of 2696 2664 cmd.exe 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe PID 2664 wrote to memory of 2696 2664 cmd.exe 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe PID 2664 wrote to memory of 2696 2664 cmd.exe 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe PID 2664 wrote to memory of 2696 2664 cmd.exe 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe PID 2028 wrote to memory of 2660 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2028 wrote to memory of 2660 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2028 wrote to memory of 2660 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2028 wrote to memory of 2660 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2028 wrote to memory of 852 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2028 wrote to memory of 852 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2028 wrote to memory of 852 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2028 wrote to memory of 852 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2028 wrote to memory of 2408 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2028 wrote to memory of 2408 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2028 wrote to memory of 2408 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2028 wrote to memory of 2408 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2028 wrote to memory of 2712 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2028 wrote to memory of 2712 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2028 wrote to memory of 2712 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2028 wrote to memory of 2712 2028 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2712 wrote to memory of 2688 2712 cmd.exe cscript.exe PID 2712 wrote to memory of 2688 2712 cmd.exe cscript.exe PID 2712 wrote to memory of 2688 2712 cmd.exe cscript.exe PID 2712 wrote to memory of 2688 2712 cmd.exe cscript.exe PID 2696 wrote to memory of 1048 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2696 wrote to memory of 1048 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2696 wrote to memory of 1048 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2696 wrote to memory of 1048 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 1048 wrote to memory of 2972 1048 cmd.exe 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe PID 1048 wrote to memory of 2972 1048 cmd.exe 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe PID 1048 wrote to memory of 2972 1048 cmd.exe 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe PID 1048 wrote to memory of 2972 1048 cmd.exe 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe PID 2696 wrote to memory of 1592 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2696 wrote to memory of 1592 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2696 wrote to memory of 1592 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2696 wrote to memory of 1592 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2696 wrote to memory of 2772 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2696 wrote to memory of 2772 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2696 wrote to memory of 2772 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2696 wrote to memory of 2772 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2696 wrote to memory of 2788 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2696 wrote to memory of 2788 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2696 wrote to memory of 2788 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2696 wrote to memory of 2788 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe reg.exe PID 2696 wrote to memory of 2940 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2696 wrote to memory of 2940 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2696 wrote to memory of 2940 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2696 wrote to memory of 2940 2696 98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe cmd.exe PID 2940 wrote to memory of 2584 2940 cmd.exe cscript.exe PID 2940 wrote to memory of 2584 2940 cmd.exe cscript.exe PID 2940 wrote to memory of 2584 2940 cmd.exe cscript.exe PID 2940 wrote to memory of 2584 2940 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe"C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\hesAkUQQ\ueAkcosM.exe"C:\Users\Admin\hesAkUQQ\ueAkcosM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2356
-
-
C:\ProgramData\cUcYookg\OKoIUUsE.exe"C:\ProgramData\cUcYookg\OKoIUUsE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1208
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"2⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f6543⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"4⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f6545⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"6⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f6547⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"8⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f6549⤵
- Suspicious behavior: EnumeratesProcesses
PID:540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"10⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65411⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"12⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65413⤵
- Suspicious behavior: EnumeratesProcesses
PID:648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"14⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65415⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"16⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65417⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"18⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65419⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"20⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65421⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"22⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65423⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"24⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65425⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"26⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65427⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"28⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65429⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"30⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65431⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"32⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65433⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"34⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65435⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"36⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65437⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"38⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65439⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"40⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65441⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"42⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65443⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"44⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65445⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"46⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65447⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"48⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65449⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"50⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65451⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"52⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65453⤵
- Suspicious behavior: EnumeratesProcesses
PID:2096 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"54⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65455⤵
- Suspicious behavior: EnumeratesProcesses
PID:940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"56⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65457⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"58⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65459⤵
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"60⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65461⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"62⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65463⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"64⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65465⤵PID:1684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"66⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65467⤵PID:856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"68⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65469⤵PID:2228
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"70⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65471⤵PID:2896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"72⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65473⤵PID:1600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"74⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65475⤵PID:1872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"76⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65477⤵PID:2444
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"78⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65479⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"80⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65481⤵PID:320
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"82⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65483⤵PID:2868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"84⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65485⤵PID:2560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"86⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65487⤵PID:2436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"88⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65489⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"90⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65491⤵PID:2564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"92⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65493⤵PID:1880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"94⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65495⤵PID:1816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"96⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65497⤵PID:540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"98⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f65499⤵PID:2380
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"100⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654101⤵PID:584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"102⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654103⤵PID:1128
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"104⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654105⤵PID:2788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"106⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654107⤵PID:1060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"108⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654109⤵PID:2064
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"110⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654111⤵PID:2592
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"112⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654113⤵PID:3000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"114⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654115⤵PID:2400
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"116⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654117⤵PID:684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"118⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654119⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"120⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654.exeC:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654121⤵PID:804
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\98d75a3c50e0f29b199a323a902f33a65bebe169a6532f5d2569e93289a1f654"122⤵PID:2828
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-