Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe
Resource
win10v2004-20240802-en
General
-
Target
d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe
-
Size
195KB
-
MD5
7cd1c502be3c128ca2e8efe1918e7795
-
SHA1
a926851aca88aefd2e8fc96a757b9e5cce4071bc
-
SHA256
d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26
-
SHA512
6eceb850db33680973aa5d8553e2258ebd564863699bf0ff356f0997cf0ce619edb0669cfc6b0139f238de09f14b0effa0105f4fb17e717ec99f749c27111112
-
SSDEEP
3072:G+lEDJNzIcS07hlrXKY/O5aHLBXZx4HNEjAO4Tb3ZUZiX4b+xp:MNzQ4bjKgZHHkNZJTb2gxp
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (60) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\International\Geo\Nation IaUUIoYg.exe -
Executes dropped EXE 2 IoCs
pid Process 2692 TmMYYUAw.exe 2076 IaUUIoYg.exe -
Loads dropped DLL 20 IoCs
pid Process 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\IaUUIoYg.exe = "C:\\ProgramData\\RMUIwoQI\\IaUUIoYg.exe" d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\IaUUIoYg.exe = "C:\\ProgramData\\RMUIwoQI\\IaUUIoYg.exe" IaUUIoYg.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\TmMYYUAw.exe = "C:\\Users\\Admin\\mYcwwoAs\\TmMYYUAw.exe" TmMYYUAw.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\TmMYYUAw.exe = "C:\\Users\\Admin\\mYcwwoAs\\TmMYYUAw.exe" d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico IaUUIoYg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2920 reg.exe 2604 reg.exe 2104 reg.exe 1028 reg.exe 2552 reg.exe 3020 reg.exe 1524 reg.exe 1732 reg.exe 1908 reg.exe 828 reg.exe 1980 reg.exe 1604 reg.exe 1612 reg.exe 648 reg.exe 3020 reg.exe 1868 reg.exe 2688 reg.exe 2720 reg.exe 1000 reg.exe 816 reg.exe 2884 reg.exe 2460 reg.exe 1252 reg.exe 2824 reg.exe 2420 reg.exe 2504 reg.exe 928 reg.exe 2128 reg.exe 1624 reg.exe 1740 reg.exe 640 reg.exe 3008 reg.exe 2648 reg.exe 2620 reg.exe 2256 reg.exe 828 reg.exe 2932 reg.exe 2132 reg.exe 2136 reg.exe 1904 reg.exe 1716 reg.exe 904 reg.exe 1556 reg.exe 2052 reg.exe 2888 reg.exe 3040 reg.exe 2252 reg.exe 444 reg.exe 2904 reg.exe 2796 reg.exe 2020 reg.exe 2412 reg.exe 2768 reg.exe 2004 reg.exe 2660 reg.exe 828 reg.exe 1648 reg.exe 2244 reg.exe 2508 reg.exe 1668 reg.exe 2624 reg.exe 2796 reg.exe 2244 reg.exe 1064 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2552 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2552 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2396 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2396 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1492 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1492 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1732 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1732 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1988 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1988 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2732 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2732 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2040 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2040 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1984 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1984 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2508 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2508 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2252 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2252 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2824 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2824 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2488 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2488 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1868 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1868 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1644 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1644 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1792 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1792 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1300 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1300 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2316 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2316 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1700 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1700 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2592 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2592 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2124 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2124 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 3044 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 3044 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1908 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1908 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1704 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1704 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2704 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2704 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1056 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 1056 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2096 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2096 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2308 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2308 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2716 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2716 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2636 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2636 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2704 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 2704 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2076 IaUUIoYg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe 2076 IaUUIoYg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2692 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 30 PID 2980 wrote to memory of 2692 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 30 PID 2980 wrote to memory of 2692 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 30 PID 2980 wrote to memory of 2692 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 30 PID 2980 wrote to memory of 2076 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 31 PID 2980 wrote to memory of 2076 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 31 PID 2980 wrote to memory of 2076 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 31 PID 2980 wrote to memory of 2076 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 31 PID 2980 wrote to memory of 2932 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 32 PID 2980 wrote to memory of 2932 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 32 PID 2980 wrote to memory of 2932 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 32 PID 2980 wrote to memory of 2932 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 32 PID 2980 wrote to memory of 700 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 34 PID 2980 wrote to memory of 700 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 34 PID 2980 wrote to memory of 700 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 34 PID 2980 wrote to memory of 700 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 34 PID 2932 wrote to memory of 2472 2932 cmd.exe 35 PID 2932 wrote to memory of 2472 2932 cmd.exe 35 PID 2932 wrote to memory of 2472 2932 cmd.exe 35 PID 2932 wrote to memory of 2472 2932 cmd.exe 35 PID 2980 wrote to memory of 2312 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 36 PID 2980 wrote to memory of 2312 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 36 PID 2980 wrote to memory of 2312 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 36 PID 2980 wrote to memory of 2312 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 36 PID 2980 wrote to memory of 2716 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 38 PID 2980 wrote to memory of 2716 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 38 PID 2980 wrote to memory of 2716 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 38 PID 2980 wrote to memory of 2716 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 38 PID 2980 wrote to memory of 2808 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 40 PID 2980 wrote to memory of 2808 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 40 PID 2980 wrote to memory of 2808 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 40 PID 2980 wrote to memory of 2808 2980 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 40 PID 2808 wrote to memory of 2636 2808 cmd.exe 43 PID 2808 wrote to memory of 2636 2808 cmd.exe 43 PID 2808 wrote to memory of 2636 2808 cmd.exe 43 PID 2808 wrote to memory of 2636 2808 cmd.exe 43 PID 2472 wrote to memory of 2672 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 44 PID 2472 wrote to memory of 2672 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 44 PID 2472 wrote to memory of 2672 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 44 PID 2472 wrote to memory of 2672 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 44 PID 2672 wrote to memory of 2552 2672 cmd.exe 46 PID 2672 wrote to memory of 2552 2672 cmd.exe 46 PID 2672 wrote to memory of 2552 2672 cmd.exe 46 PID 2672 wrote to memory of 2552 2672 cmd.exe 46 PID 2472 wrote to memory of 2504 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 47 PID 2472 wrote to memory of 2504 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 47 PID 2472 wrote to memory of 2504 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 47 PID 2472 wrote to memory of 2504 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 47 PID 2472 wrote to memory of 3028 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 48 PID 2472 wrote to memory of 3028 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 48 PID 2472 wrote to memory of 3028 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 48 PID 2472 wrote to memory of 3028 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 48 PID 2472 wrote to memory of 3032 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 49 PID 2472 wrote to memory of 3032 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 49 PID 2472 wrote to memory of 3032 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 49 PID 2472 wrote to memory of 3032 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 49 PID 2472 wrote to memory of 1376 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 50 PID 2472 wrote to memory of 1376 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 50 PID 2472 wrote to memory of 1376 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 50 PID 2472 wrote to memory of 1376 2472 d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe 50 PID 1376 wrote to memory of 1944 1376 cmd.exe 55 PID 1376 wrote to memory of 1944 1376 cmd.exe 55 PID 1376 wrote to memory of 1944 1376 cmd.exe 55 PID 1376 wrote to memory of 1944 1376 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe"C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\mYcwwoAs\TmMYYUAw.exe"C:\Users\Admin\mYcwwoAs\TmMYYUAw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2692
-
-
C:\ProgramData\RMUIwoQI\IaUUIoYg.exe"C:\ProgramData\RMUIwoQI\IaUUIoYg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2076
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"2⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c263⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"4⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c265⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"6⤵
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c267⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"8⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c269⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"10⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2611⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"12⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2613⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"14⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2615⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"16⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2617⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"18⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2619⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"20⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2621⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"22⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2623⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"24⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2625⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"26⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2627⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"28⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2629⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"30⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2631⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"32⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2633⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"34⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2635⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"36⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2637⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"38⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2639⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"40⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2641⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"42⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2643⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"44⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2645⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"46⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2647⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"48⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2649⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"50⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2651⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"52⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2653⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"54⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2655⤵
- Suspicious behavior: EnumeratesProcesses
PID:2096 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"56⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2657⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"58⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2659⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"60⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2661⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"62⤵PID:236
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2663⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"64⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2665⤵PID:2024
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"66⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2667⤵PID:2320
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"68⤵
- System Location Discovery: System Language Discovery
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2669⤵PID:2664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"70⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2671⤵PID:1324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"72⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2673⤵PID:1344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"74⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2675⤵PID:1572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"76⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2677⤵PID:1616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"78⤵
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2679⤵PID:1884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"80⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2681⤵PID:3000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"82⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2683⤵PID:2456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"84⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2685⤵PID:1220
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"86⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2687⤵PID:2256
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"88⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2689⤵PID:2180
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"90⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2691⤵PID:2552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"92⤵
- System Location Discovery: System Language Discovery
PID:544 -
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2693⤵PID:2936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"94⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2695⤵PID:2244
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"96⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2697⤵
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"98⤵
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c2699⤵
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"100⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26101⤵PID:1636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"102⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26103⤵PID:3048
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"104⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26105⤵PID:1188
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"106⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26107⤵PID:1528
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"108⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26109⤵PID:2388
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"110⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26111⤵PID:2128
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"112⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26113⤵PID:2012
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"114⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26115⤵PID:2884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"116⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26117⤵PID:1688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"118⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26119⤵
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"120⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26.exeC:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26121⤵PID:1068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\d9c3491a5e775504c240f9e18b7b3d4171bca0191c5fc090a91cc8848bf55c26"122⤵PID:900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-