Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe
Resource
win10v2004-20240508-en
General
-
Target
aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe
-
Size
610KB
-
MD5
da97e6d9e3508bb209c851da4aaa8f2f
-
SHA1
f7f4888b4a08c7433169fc045d05d8f9561d58ba
-
SHA256
aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf
-
SHA512
8b8193e39881157597b42a87303d0cc031fef10b646e661a74eebf42e66debfb0c5b4700c8a226a0b73dde8b9708812874c18d41e57e89d718816a3d16a215f3
-
SSDEEP
12288:b4vC5gvNcUHXg+mkoBIZuEp++7PVkb41gx32rT:b4vCSvNcGXm1IAEp++Ba4mx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\UUokEEoU\\PqoAogMc.exe,C:\\ProgramData\\SeokIEAI\\eIQIYgEQ.exe," aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\UUokEEoU\\PqoAogMc.exe,C:\\ProgramData\\SeokIEAI\\eIQIYgEQ.exe," aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\UUokEEoU\\PqoAogMc.exe," aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\UUokEEoU\\PqoAogMc.exe," aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation TmMcIMIk.exe -
Executes dropped EXE 3 IoCs
pid Process 1332 TmMcIMIk.exe 3596 PqoAogMc.exe 1140 QIcQEQUo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KIgQUcQg.exe = "C:\\Users\\Admin\\yKMcQMcE\\KIgQUcQg.exe" aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\eIQIYgEQ.exe = "C:\\ProgramData\\SeokIEAI\\eIQIYgEQ.exe" aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TmMcIMIk.exe = "C:\\Users\\Admin\\EoYIcEQg\\TmMcIMIk.exe" aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PqoAogMc.exe = "C:\\ProgramData\\UUokEEoU\\PqoAogMc.exe" aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TmMcIMIk.exe = "C:\\Users\\Admin\\EoYIcEQg\\TmMcIMIk.exe" TmMcIMIk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PqoAogMc.exe = "C:\\ProgramData\\UUokEEoU\\PqoAogMc.exe" PqoAogMc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PqoAogMc.exe = "C:\\ProgramData\\UUokEEoU\\PqoAogMc.exe" QIcQEQUo.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheStepComplete.pptm TmMcIMIk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\EoYIcEQg QIcQEQUo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\EoYIcEQg\TmMcIMIk QIcQEQUo.exe File created C:\Windows\SysWOW64\shell32.dll.exe TmMcIMIk.exe File opened for modification C:\Windows\SysWOW64\sheGroupUndo.pdf TmMcIMIk.exe File opened for modification C:\Windows\SysWOW64\sheJoinBlock.jpg TmMcIMIk.exe File opened for modification C:\Windows\SysWOW64\sheRemoveClear.xlsb TmMcIMIk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4356 1820 WerFault.exe 654 3612 4484 WerFault.exe 653 5108 4556 WerFault.exe 656 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1208 reg.exe 3648 reg.exe 3404 reg.exe 2568 reg.exe 2376 reg.exe 4812 reg.exe 1352 reg.exe 3492 reg.exe 1416 reg.exe 4072 reg.exe 2540 reg.exe 2400 reg.exe 1532 reg.exe 3704 reg.exe 2320 reg.exe 2092 reg.exe 3592 reg.exe 1840 reg.exe 1040 reg.exe 4208 reg.exe 1568 reg.exe 1496 reg.exe 1128 reg.exe 1496 reg.exe 1840 reg.exe 3708 reg.exe 2668 reg.exe 5020 reg.exe 5072 reg.exe 2164 reg.exe 3568 reg.exe 2836 reg.exe 4660 reg.exe 3980 reg.exe 2096 reg.exe 2052 reg.exe 1164 reg.exe 2504 reg.exe 5108 reg.exe 4808 reg.exe 5108 reg.exe 1044 reg.exe 4052 reg.exe 1316 reg.exe 660 reg.exe 4780 reg.exe 920 reg.exe 2464 reg.exe 3304 reg.exe 4708 reg.exe 2096 reg.exe 3924 reg.exe 2164 reg.exe 3256 reg.exe 5072 reg.exe 4060 reg.exe 2464 reg.exe 4612 reg.exe 4880 reg.exe 3060 reg.exe 5108 reg.exe 4928 reg.exe 2424 reg.exe 3960 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4624 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4624 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4624 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4624 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3508 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3508 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3508 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3508 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3404 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3404 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3404 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3404 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 1552 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 1552 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 1552 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 1552 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4800 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4800 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4800 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4800 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 1712 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 1712 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 1712 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 1712 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3712 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3712 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3712 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 3712 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 1044 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 1044 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 1044 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 1044 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 408 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 408 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 408 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 408 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4792 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4792 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4792 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4792 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4544 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4544 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4544 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4544 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4368 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4368 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4368 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 4368 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 2400 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 2400 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 2400 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 2400 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1332 TmMcIMIk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe 1332 TmMcIMIk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3876 wrote to memory of 1332 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 84 PID 3876 wrote to memory of 1332 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 84 PID 3876 wrote to memory of 1332 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 84 PID 3876 wrote to memory of 3596 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 86 PID 3876 wrote to memory of 3596 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 86 PID 3876 wrote to memory of 3596 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 86 PID 3876 wrote to memory of 2108 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 88 PID 3876 wrote to memory of 2108 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 88 PID 3876 wrote to memory of 2108 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 88 PID 2108 wrote to memory of 4840 2108 cmd.exe 90 PID 2108 wrote to memory of 4840 2108 cmd.exe 90 PID 2108 wrote to memory of 4840 2108 cmd.exe 90 PID 3876 wrote to memory of 3588 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 91 PID 3876 wrote to memory of 3588 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 91 PID 3876 wrote to memory of 3588 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 91 PID 3876 wrote to memory of 1352 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 92 PID 3876 wrote to memory of 1352 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 92 PID 3876 wrote to memory of 1352 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 92 PID 3876 wrote to memory of 4760 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 93 PID 3876 wrote to memory of 4760 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 93 PID 3876 wrote to memory of 4760 3876 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 93 PID 4840 wrote to memory of 228 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 97 PID 4840 wrote to memory of 228 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 97 PID 4840 wrote to memory of 228 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 97 PID 228 wrote to memory of 2224 228 cmd.exe 99 PID 228 wrote to memory of 2224 228 cmd.exe 99 PID 228 wrote to memory of 2224 228 cmd.exe 99 PID 4840 wrote to memory of 2464 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 100 PID 4840 wrote to memory of 2464 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 100 PID 4840 wrote to memory of 2464 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 100 PID 4840 wrote to memory of 5096 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 101 PID 4840 wrote to memory of 5096 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 101 PID 4840 wrote to memory of 5096 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 101 PID 4840 wrote to memory of 1580 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 103 PID 4840 wrote to memory of 1580 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 103 PID 4840 wrote to memory of 1580 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 103 PID 4840 wrote to memory of 1068 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 105 PID 4840 wrote to memory of 1068 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 105 PID 4840 wrote to memory of 1068 4840 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 105 PID 2224 wrote to memory of 4120 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 108 PID 2224 wrote to memory of 4120 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 108 PID 2224 wrote to memory of 4120 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 108 PID 1068 wrote to memory of 1436 1068 cmd.exe 110 PID 1068 wrote to memory of 1436 1068 cmd.exe 110 PID 1068 wrote to memory of 1436 1068 cmd.exe 110 PID 2224 wrote to memory of 3332 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 111 PID 2224 wrote to memory of 3332 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 111 PID 2224 wrote to memory of 3332 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 111 PID 2224 wrote to memory of 2504 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 112 PID 2224 wrote to memory of 2504 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 112 PID 2224 wrote to memory of 2504 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 112 PID 2224 wrote to memory of 1664 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 113 PID 2224 wrote to memory of 1664 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 113 PID 2224 wrote to memory of 1664 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 113 PID 2224 wrote to memory of 3480 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 114 PID 2224 wrote to memory of 3480 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 114 PID 2224 wrote to memory of 3480 2224 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 114 PID 4120 wrote to memory of 4624 4120 cmd.exe 116 PID 4120 wrote to memory of 4624 4120 cmd.exe 116 PID 4120 wrote to memory of 4624 4120 cmd.exe 116 PID 3480 wrote to memory of 2576 3480 cmd.exe 120 PID 3480 wrote to memory of 2576 3480 cmd.exe 120 PID 3480 wrote to memory of 2576 3480 cmd.exe 120 PID 4624 wrote to memory of 2668 4624 aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe"C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\EoYIcEQg\TmMcIMIk.exe"C:\Users\Admin\EoYIcEQg\TmMcIMIk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1332
-
-
C:\ProgramData\UUokEEoU\PqoAogMc.exe"C:\ProgramData\UUokEEoU\PqoAogMc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"2⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"4⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"6⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"8⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"10⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"12⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"14⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"16⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"18⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"20⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"22⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf23⤵
- Suspicious behavior: EnumeratesProcesses
PID:408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"24⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"26⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"28⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"30⤵PID:1252
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵PID:3712
-
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"32⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf33⤵PID:2460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"34⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf35⤵PID:4824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"36⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf37⤵PID:4548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"38⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf39⤵PID:2052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"40⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf41⤵PID:1608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"42⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf43⤵PID:4952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"44⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf45⤵PID:1832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"46⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf47⤵PID:512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"48⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf49⤵PID:1656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"50⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf51⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"52⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf53⤵PID:684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"54⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf55⤵PID:3136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"56⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf57⤵PID:396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"58⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf59⤵PID:3592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"60⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf61⤵PID:3332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"62⤵PID:4116
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf63⤵PID:2188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"64⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf65⤵PID:4120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"66⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf67⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"68⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf69⤵PID:3008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"70⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf71⤵PID:3968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"72⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf73⤵PID:2212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"74⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf75⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"76⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf77⤵PID:1736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"78⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf79⤵PID:2580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"80⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf81⤵PID:4840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"82⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf83⤵PID:4552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"84⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf85⤵PID:4204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"86⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf87⤵PID:4624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"88⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf89⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"90⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf91⤵PID:2216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"92⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf93⤵PID:2184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"94⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf95⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
PID:4352 -
C:\Users\Admin\yKMcQMcE\KIgQUcQg.exe"C:\Users\Admin\yKMcQMcE\KIgQUcQg.exe"96⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 22897⤵
- Program crash
PID:3612
-
-
-
C:\ProgramData\SeokIEAI\eIQIYgEQ.exe"C:\ProgramData\SeokIEAI\eIQIYgEQ.exe"96⤵PID:1820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 26497⤵
- Program crash
PID:4356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"96⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf97⤵PID:3136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"98⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf99⤵PID:2772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"100⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf101⤵PID:1764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"102⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf103⤵PID:4920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"104⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf105⤵PID:1036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"106⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf107⤵PID:408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"108⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf109⤵PID:4412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"110⤵PID:2104
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf111⤵PID:4116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"112⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf113⤵PID:1416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"114⤵PID:4836
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf115⤵PID:2576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"116⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf117⤵PID:2100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"118⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf119⤵PID:732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"120⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf.exeC:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf121⤵PID:2464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf"122⤵PID:5056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-