Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe
Resource
win7-20240729-en
General
-
Target
fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe
-
Size
1006KB
-
MD5
2bfca009593c6b4be53979cf8d69023d
-
SHA1
0c019852533ee4d6f36dccdd6c0fca8070de2944
-
SHA256
fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592
-
SHA512
e361860ab966bfec775d2d6ac4482dfd39516ef39d3c8069ec79a8d60a83a74a0103af8515408a1f2ff16145dd157a28e89adff469d9e3e800d602ec3367b8c4
-
SSDEEP
24576:/LZgDe961iKogI4B92x5CRnSjOVOPU3SrJrQBC/1cokZzY:/LZgD91i2tcgnSjO5wdQZ0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\qmUIIcMM\\uAkAEwkc.exe," fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\qmUIIcMM\\uAkAEwkc.exe," fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\Geo\Nation OgcwAwkI.exe -
Executes dropped EXE 3 IoCs
pid Process 3016 OgcwAwkI.exe 2356 uAkAEwkc.exe 2912 VAgQAYwc.exe -
Loads dropped DLL 10 IoCs
pid Process 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2356 uAkAEwkc.exe 2356 uAkAEwkc.exe 2356 uAkAEwkc.exe 2356 uAkAEwkc.exe 2356 uAkAEwkc.exe 2356 uAkAEwkc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\OgcwAwkI.exe = "C:\\Users\\Admin\\SGgcwoUY\\OgcwAwkI.exe" OgcwAwkI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uAkAEwkc.exe = "C:\\ProgramData\\qmUIIcMM\\uAkAEwkc.exe" uAkAEwkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uAkAEwkc.exe = "C:\\ProgramData\\qmUIIcMM\\uAkAEwkc.exe" VAgQAYwc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\OgcwAwkI.exe = "C:\\Users\\Admin\\SGgcwoUY\\OgcwAwkI.exe" fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uAkAEwkc.exe = "C:\\ProgramData\\qmUIIcMM\\uAkAEwkc.exe" fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\SGgcwoUY VAgQAYwc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\SGgcwoUY\OgcwAwkI VAgQAYwc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 2704 2464 WerFault.exe 29 2248 1132 WerFault.exe 35 2972 2272 WerFault.exe 45 532 2012 WerFault.exe 55 2168 588 WerFault.exe 65 2212 2196 WerFault.exe 75 3020 1524 WerFault.exe 85 2900 2056 WerFault.exe 95 2680 2968 WerFault.exe 105 2928 2676 WerFault.exe 115 1588 1376 WerFault.exe 125 1472 1252 WerFault.exe 135 1740 1996 WerFault.exe 145 2124 800 WerFault.exe 155 2764 1780 WerFault.exe 165 1536 584 WerFault.exe 182 1188 2200 WerFault.exe 185 2320 2460 WerFault.exe 195 2332 2952 WerFault.exe 205 2028 2280 WerFault.exe 215 1912 1896 WerFault.exe 225 2364 2756 WerFault.exe 235 2860 1604 WerFault.exe 245 2608 2100 WerFault.exe 255 2932 1924 WerFault.exe 265 628 660 WerFault.exe 275 304 2400 WerFault.exe 285 2188 2780 WerFault.exe 295 3232 1852 WerFault.exe 305 3424 3184 WerFault.exe 315 3572 3360 WerFault.exe 325 3752 3532 WerFault.exe 335 3928 3704 WerFault.exe 345 3084 3880 WerFault.exe 355 3252 4052 WerFault.exe 365 3492 3260 WerFault.exe 375 3784 3420 WerFault.exe 385 1552 3680 WerFault.exe 395 3176 3900 WerFault.exe 405 3432 4080 WerFault.exe 415 3852 3444 WerFault.exe 425 3256 3792 WerFault.exe 435 3476 992 WerFault.exe 445 4016 3488 WerFault.exe 455 3616 3924 WerFault.exe 465 3304 3452 WerFault.exe 475 4000 3960 WerFault.exe 485 3436 932 WerFault.exe 495 3372 3400 WerFault.exe 505 4104 916 WerFault.exe 515 4268 4044 WerFault.exe 525 4436 4228 WerFault.exe 535 4608 4396 WerFault.exe 545 4776 4568 WerFault.exe 555 4952 4736 WerFault.exe 565 5112 4904 WerFault.exe 575 4288 5076 WerFault.exe 585 4516 4236 WerFault.exe 595 4760 4472 WerFault.exe 605 4968 4704 WerFault.exe 615 4280 4924 WerFault.exe 625 4656 4188 WerFault.exe 635 4948 4500 WerFault.exe 645 5020 4980 WerFault.exe 655 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAgQAYwc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1852 reg.exe 3200 reg.exe 3272 reg.exe 4432 reg.exe 2156 reg.exe 6280 reg.exe 6424 reg.exe 5244 reg.exe 3564 reg.exe 3580 reg.exe 8992 reg.exe 4068 reg.exe 3848 reg.exe 1908 reg.exe 3076 reg.exe 8436 reg.exe 2660 reg.exe 5096 reg.exe 4560 reg.exe 6864 reg.exe 756 reg.exe 5048 reg.exe 1816 reg.exe 552 reg.exe 7232 reg.exe 8408 reg.exe 8324 reg.exe 840 reg.exe 4084 reg.exe 768 reg.exe 5900 reg.exe 2500 reg.exe 4584 reg.exe 4836 reg.exe 7376 reg.exe 7240 reg.exe 1688 reg.exe 1060 reg.exe 4768 reg.exe 6312 reg.exe 3148 reg.exe 8032 reg.exe 6596 reg.exe 3720 reg.exe 6912 reg.exe 7236 reg.exe 8092 reg.exe 2828 reg.exe 3148 reg.exe 8476 reg.exe 3248 reg.exe 3116 reg.exe 3916 reg.exe 6732 reg.exe 7924 reg.exe 8772 reg.exe 2336 reg.exe 4816 reg.exe 5176 reg.exe 7688 reg.exe 9016 reg.exe 6216 reg.exe 7868 reg.exe 7876 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2272 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2272 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2012 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2012 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 588 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 588 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2196 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2196 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1524 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1524 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2056 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2056 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2968 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2968 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1376 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1376 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1252 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1252 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1996 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1996 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 800 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 800 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1780 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1780 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 584 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 584 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2200 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2200 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2200 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2200 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2460 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2460 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2460 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2460 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2952 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2952 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2952 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2952 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2280 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2280 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2280 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2280 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1896 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1896 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1896 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1896 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1896 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1896 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2756 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2756 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2756 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2756 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2756 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2756 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1604 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1604 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1604 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 1604 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe 3016 OgcwAwkI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 3016 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 30 PID 2464 wrote to memory of 3016 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 30 PID 2464 wrote to memory of 3016 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 30 PID 2464 wrote to memory of 3016 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 30 PID 2464 wrote to memory of 2356 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 31 PID 2464 wrote to memory of 2356 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 31 PID 2464 wrote to memory of 2356 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 31 PID 2464 wrote to memory of 2356 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 31 PID 2464 wrote to memory of 2992 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 33 PID 2464 wrote to memory of 2992 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 33 PID 2464 wrote to memory of 2992 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 33 PID 2464 wrote to memory of 2992 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 33 PID 2992 wrote to memory of 1132 2992 cmd.exe 35 PID 2992 wrote to memory of 1132 2992 cmd.exe 35 PID 2992 wrote to memory of 1132 2992 cmd.exe 35 PID 2992 wrote to memory of 1132 2992 cmd.exe 35 PID 2464 wrote to memory of 2664 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 36 PID 2464 wrote to memory of 2664 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 36 PID 2464 wrote to memory of 2664 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 36 PID 2464 wrote to memory of 2664 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 36 PID 2464 wrote to memory of 2672 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 37 PID 2464 wrote to memory of 2672 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 37 PID 2464 wrote to memory of 2672 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 37 PID 2464 wrote to memory of 2672 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 37 PID 2464 wrote to memory of 2680 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 38 PID 2464 wrote to memory of 2680 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 38 PID 2464 wrote to memory of 2680 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 38 PID 2464 wrote to memory of 2680 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 38 PID 2464 wrote to memory of 2704 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 39 PID 2464 wrote to memory of 2704 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 39 PID 2464 wrote to memory of 2704 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 39 PID 2464 wrote to memory of 2704 2464 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 39 PID 1132 wrote to memory of 1788 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 43 PID 1132 wrote to memory of 1788 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 43 PID 1132 wrote to memory of 1788 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 43 PID 1132 wrote to memory of 1788 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 43 PID 1788 wrote to memory of 2272 1788 cmd.exe 45 PID 1788 wrote to memory of 2272 1788 cmd.exe 45 PID 1788 wrote to memory of 2272 1788 cmd.exe 45 PID 1788 wrote to memory of 2272 1788 cmd.exe 45 PID 1132 wrote to memory of 1720 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 46 PID 1132 wrote to memory of 1720 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 46 PID 1132 wrote to memory of 1720 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 46 PID 1132 wrote to memory of 1720 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 46 PID 1132 wrote to memory of 2500 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 47 PID 1132 wrote to memory of 2500 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 47 PID 1132 wrote to memory of 2500 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 47 PID 1132 wrote to memory of 2500 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 47 PID 1132 wrote to memory of 1408 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 50 PID 1132 wrote to memory of 1408 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 50 PID 1132 wrote to memory of 1408 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 50 PID 1132 wrote to memory of 1408 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 50 PID 1132 wrote to memory of 2248 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 51 PID 1132 wrote to memory of 2248 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 51 PID 1132 wrote to memory of 2248 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 51 PID 1132 wrote to memory of 2248 1132 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 51 PID 2272 wrote to memory of 2208 2272 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 53 PID 2272 wrote to memory of 2208 2272 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 53 PID 2272 wrote to memory of 2208 2272 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 53 PID 2272 wrote to memory of 2208 2272 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 53 PID 2208 wrote to memory of 2012 2208 cmd.exe 55 PID 2208 wrote to memory of 2012 2208 cmd.exe 55 PID 2208 wrote to memory of 2012 2208 cmd.exe 55 PID 2208 wrote to memory of 2012 2208 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe"C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\SGgcwoUY\OgcwAwkI.exe"C:\Users\Admin\SGgcwoUY\OgcwAwkI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:3016
-
-
C:\ProgramData\qmUIIcMM\uAkAEwkc.exe"C:\ProgramData\qmUIIcMM\uAkAEwkc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2356
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd5923⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"4⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd5925⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"6⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd5927⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"8⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd5929⤵
- Suspicious behavior: EnumeratesProcesses
PID:588 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"10⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59211⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"12⤵
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59213⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"14⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59215⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"16⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59217⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"18⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59219⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"20⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59221⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"22⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59223⤵
- Suspicious behavior: EnumeratesProcesses
PID:1252 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"24⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59225⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"26⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59227⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"28⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59229⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"30⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59231⤵
- Suspicious behavior: EnumeratesProcesses
PID:584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"32⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59233⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"34⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59235⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"36⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59237⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"38⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59239⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"40⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59241⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"42⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59243⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"44⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59245⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"46⤵
- System Location Discovery: System Language Discovery
PID:876 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59247⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"48⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59249⤵PID:1924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"50⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59251⤵PID:660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"52⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59253⤵PID:2400
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"54⤵
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59255⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"56⤵
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59257⤵PID:1852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"58⤵
- System Location Discovery: System Language Discovery
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59259⤵PID:3184
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"60⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59261⤵PID:3360
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"62⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59263⤵PID:3532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"64⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59265⤵
- System Location Discovery: System Language Discovery
PID:3704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"66⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59267⤵PID:3880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"68⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59269⤵PID:4052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"70⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59271⤵PID:3260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"72⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59273⤵PID:3420
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"74⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59275⤵PID:3680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"76⤵
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59277⤵PID:3900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"78⤵
- System Location Discovery: System Language Discovery
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59279⤵
- System Location Discovery: System Language Discovery
PID:4080 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"80⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59281⤵PID:3444
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"82⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59283⤵PID:3792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"84⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59285⤵PID:992
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"86⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59287⤵PID:3488
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"88⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59289⤵PID:3924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"90⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59291⤵PID:3452
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"92⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59293⤵PID:3960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"94⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59295⤵PID:932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"96⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59297⤵
- System Location Discovery: System Language Discovery
PID:3400 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"98⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59299⤵PID:916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"100⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592101⤵PID:4044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"102⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592103⤵PID:4228
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"104⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592105⤵PID:4396
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"106⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592107⤵PID:4568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"108⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592109⤵PID:4736
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"110⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592111⤵PID:4904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"112⤵
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592113⤵PID:5076
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"114⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592115⤵PID:4236
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"116⤵
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592117⤵PID:4472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"118⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592119⤵PID:4704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"120⤵
- System Location Discovery: System Language Discovery
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592121⤵PID:4924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"122⤵PID:3076
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-