Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe
Resource
win10v2004-20240709-en
General
-
Target
0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe
-
Size
118KB
-
MD5
4a42a126db27c478b8812cecc25d58c7
-
SHA1
ed3e53c4056e5abb39a55a69d54458ac7914e2d5
-
SHA256
0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac
-
SHA512
30e629ab9db956032fb92c8cb678bbab815eaddaf38d853581cfc7350d513168270e054ac2413ea8147e7bd15c0b3f2529e74e04fe5cd0b04e4acda482f38710
-
SSDEEP
1536:8DndwEeHUqCUNdBSFqwp9BJnNb93PLougEaAGFEsIQ0PP7QAymLqACus1hrlJ698:aUHHCOdBSFqW7xnhVlPUAys/cL88
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Control Panel\International\Geo\Nation Tioscksk.exe -
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2600 ryYwsMgg.exe 1980 Tioscksk.exe -
Loads dropped DLL 20 IoCs
pid Process 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\yooUgowE.exe = "C:\\Users\\Admin\\xqIQsUYA\\yooUgowE.exe" 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TAkYQMcU.exe = "C:\\ProgramData\\mAUEwYEM\\TAkYQMcU.exe" 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\ryYwsMgg.exe = "C:\\Users\\Admin\\jKgMgwgI\\ryYwsMgg.exe" 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Tioscksk.exe = "C:\\ProgramData\\fkUgkMQM\\Tioscksk.exe" 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Tioscksk.exe = "C:\\ProgramData\\fkUgkMQM\\Tioscksk.exe" Tioscksk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\ryYwsMgg.exe = "C:\\Users\\Admin\\jKgMgwgI\\ryYwsMgg.exe" ryYwsMgg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico Tioscksk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1948 1728 WerFault.exe 284 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2508 reg.exe 996 reg.exe 2892 reg.exe 1796 reg.exe 2948 reg.exe 1808 reg.exe 2432 reg.exe 1512 reg.exe 2404 reg.exe 2256 reg.exe 1976 reg.exe 1504 reg.exe 2908 reg.exe 1352 reg.exe 924 reg.exe 1992 reg.exe 1828 reg.exe 2360 reg.exe 3064 reg.exe 2772 reg.exe 1156 reg.exe 1492 reg.exe 1148 reg.exe 1144 reg.exe 1716 reg.exe 2836 reg.exe 2820 reg.exe 2756 reg.exe 1676 reg.exe 2580 reg.exe 2904 reg.exe 1976 reg.exe 1948 reg.exe 264 reg.exe 1672 reg.exe 2400 reg.exe 1296 reg.exe 1984 reg.exe 1512 reg.exe 2732 reg.exe 1492 reg.exe 1756 reg.exe 2896 reg.exe 1888 reg.exe 820 reg.exe 2736 reg.exe 2596 reg.exe 1380 reg.exe 1936 reg.exe 2320 reg.exe 1824 reg.exe 2064 reg.exe 2188 reg.exe 2632 reg.exe 2432 reg.exe 2940 reg.exe 2884 reg.exe 2596 reg.exe 1120 reg.exe 2184 reg.exe 784 reg.exe 2104 reg.exe 1500 reg.exe 2640 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2532 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2532 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 480 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 480 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2176 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2176 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1040 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1040 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1736 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1736 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2896 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2896 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1664 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1664 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2280 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2280 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 3016 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 3016 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2548 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2548 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1696 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1696 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2328 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2328 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2892 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2892 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2404 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2404 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 848 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 848 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1864 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1864 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2880 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2880 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2456 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2456 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 440 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 440 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2128 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2128 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2332 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2332 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2960 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2960 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2204 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2204 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2660 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2660 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1636 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1636 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2040 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2040 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1764 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 1764 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2228 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2228 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 588 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 588 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2964 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 2964 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1980 Tioscksk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe 1980 Tioscksk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2600 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 30 PID 1984 wrote to memory of 2600 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 30 PID 1984 wrote to memory of 2600 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 30 PID 1984 wrote to memory of 2600 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 30 PID 1984 wrote to memory of 1980 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 31 PID 1984 wrote to memory of 1980 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 31 PID 1984 wrote to memory of 1980 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 31 PID 1984 wrote to memory of 1980 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 31 PID 1984 wrote to memory of 2080 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 32 PID 1984 wrote to memory of 2080 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 32 PID 1984 wrote to memory of 2080 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 32 PID 1984 wrote to memory of 2080 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 32 PID 2080 wrote to memory of 2756 2080 cmd.exe 34 PID 2080 wrote to memory of 2756 2080 cmd.exe 34 PID 2080 wrote to memory of 2756 2080 cmd.exe 34 PID 2080 wrote to memory of 2756 2080 cmd.exe 34 PID 1984 wrote to memory of 2888 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 35 PID 1984 wrote to memory of 2888 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 35 PID 1984 wrote to memory of 2888 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 35 PID 1984 wrote to memory of 2888 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 35 PID 1984 wrote to memory of 2892 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 36 PID 1984 wrote to memory of 2892 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 36 PID 1984 wrote to memory of 2892 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 36 PID 1984 wrote to memory of 2892 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 36 PID 1984 wrote to memory of 2904 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 37 PID 1984 wrote to memory of 2904 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 37 PID 1984 wrote to memory of 2904 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 37 PID 1984 wrote to memory of 2904 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 37 PID 1984 wrote to memory of 2876 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 38 PID 1984 wrote to memory of 2876 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 38 PID 1984 wrote to memory of 2876 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 38 PID 1984 wrote to memory of 2876 1984 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 38 PID 2876 wrote to memory of 2948 2876 cmd.exe 43 PID 2876 wrote to memory of 2948 2876 cmd.exe 43 PID 2876 wrote to memory of 2948 2876 cmd.exe 43 PID 2876 wrote to memory of 2948 2876 cmd.exe 43 PID 2756 wrote to memory of 2640 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 44 PID 2756 wrote to memory of 2640 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 44 PID 2756 wrote to memory of 2640 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 44 PID 2756 wrote to memory of 2640 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 44 PID 2640 wrote to memory of 2532 2640 cmd.exe 46 PID 2640 wrote to memory of 2532 2640 cmd.exe 46 PID 2640 wrote to memory of 2532 2640 cmd.exe 46 PID 2640 wrote to memory of 2532 2640 cmd.exe 46 PID 2756 wrote to memory of 2256 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 47 PID 2756 wrote to memory of 2256 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 47 PID 2756 wrote to memory of 2256 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 47 PID 2756 wrote to memory of 2256 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 47 PID 2756 wrote to memory of 2508 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 48 PID 2756 wrote to memory of 2508 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 48 PID 2756 wrote to memory of 2508 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 48 PID 2756 wrote to memory of 2508 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 48 PID 2756 wrote to memory of 1744 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 49 PID 2756 wrote to memory of 1744 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 49 PID 2756 wrote to memory of 1744 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 49 PID 2756 wrote to memory of 1744 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 49 PID 2756 wrote to memory of 1484 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 52 PID 2756 wrote to memory of 1484 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 52 PID 2756 wrote to memory of 1484 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 52 PID 2756 wrote to memory of 1484 2756 0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe 52 PID 1484 wrote to memory of 1492 1484 cmd.exe 55 PID 1484 wrote to memory of 1492 1484 cmd.exe 55 PID 1484 wrote to memory of 1492 1484 cmd.exe 55 PID 1484 wrote to memory of 1492 1484 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe"C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\jKgMgwgI\ryYwsMgg.exe"C:\Users\Admin\jKgMgwgI\ryYwsMgg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2600
-
-
C:\ProgramData\fkUgkMQM\Tioscksk.exe"C:\ProgramData\fkUgkMQM\Tioscksk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1980
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"4⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"6⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac7⤵
- Suspicious behavior: EnumeratesProcesses
PID:480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"8⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"10⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"12⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"14⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"16⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"18⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"20⤵PID:304
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"22⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"24⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"26⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"28⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"30⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"32⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac33⤵
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"34⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"36⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"38⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"40⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac41⤵
- Suspicious behavior: EnumeratesProcesses
PID:440 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"42⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac43⤵
- Adds Run key to start application
PID:1828 -
C:\Users\Admin\xqIQsUYA\yooUgowE.exe"C:\Users\Admin\xqIQsUYA\yooUgowE.exe"44⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 3645⤵
- Program crash
PID:1948
-
-
-
C:\ProgramData\mAUEwYEM\TAkYQMcU.exe"C:\ProgramData\mAUEwYEM\TAkYQMcU.exe"44⤵PID:1944
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"44⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"46⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"48⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"50⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"52⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"54⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"56⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"58⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"60⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"62⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac63⤵
- Suspicious behavior: EnumeratesProcesses
PID:588 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"64⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac65⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"66⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac67⤵PID:2824
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"68⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac69⤵PID:1956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"70⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac71⤵PID:904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"72⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac73⤵PID:2712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"74⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac75⤵PID:2992
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"76⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac77⤵PID:2336
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"78⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac79⤵PID:1680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"80⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac81⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"82⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac83⤵PID:2784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"84⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac85⤵PID:1436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"86⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac87⤵PID:1620
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"88⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac89⤵PID:2384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"90⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac91⤵PID:2960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"92⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac93⤵PID:2928
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"94⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac95⤵PID:2588
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"96⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac97⤵PID:1044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"98⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac99⤵PID:1968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"100⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac101⤵PID:2884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"102⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac103⤵PID:308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"104⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac105⤵PID:2824
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"106⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac107⤵PID:2968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"108⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac109⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"110⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac111⤵PID:300
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"112⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac113⤵PID:1540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"114⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac115⤵PID:2388
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"116⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac117⤵PID:2400
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"118⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac119⤵PID:992
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"120⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac.exeC:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac121⤵PID:1800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0cf79f7dd830ef3e5aa3d7cd3a9feeec3425bbd234549e3b98aca50b7455beac"122⤵PID:2932
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-