Analysis
-
max time kernel
120s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe
Resource
win10v2004-20240802-en
General
-
Target
e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe
-
Size
207KB
-
MD5
6734842061352a1ec452eeb203f99c20
-
SHA1
01b68de30212e9aeccafde46e6124f554217a541
-
SHA256
e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329
-
SHA512
0c10c564749bf42ea10a4ba2b8ae7f3f2c797811e480e3d119feadc0ccecd6cbfb019bb212cc1f8fbe1e1882b95a5902d9b8a1dda10d03dc9d49d670ffee2539
-
SSDEEP
3072:CpsjLBBiHxBwPTdqSIEFzs4yjyaJ5i4SeO/1r+KQMYoCA7yBFV9hQ:BB0Hczs4yjyaJA4SN/8KQMpCHBn
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (65) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\International\Geo\Nation psQUEsoQ.exe -
Deletes itself 1 IoCs
pid Process 2668 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1500 psQUEsoQ.exe 2428 WgkAIEcU.exe -
Loads dropped DLL 20 IoCs
pid Process 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\psQUEsoQ.exe = "C:\\Users\\Admin\\DEAoowwc\\psQUEsoQ.exe" e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WgkAIEcU.exe = "C:\\ProgramData\\lgMwQUMM\\WgkAIEcU.exe" e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\psQUEsoQ.exe = "C:\\Users\\Admin\\DEAoowwc\\psQUEsoQ.exe" psQUEsoQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WgkAIEcU.exe = "C:\\ProgramData\\lgMwQUMM\\WgkAIEcU.exe" WgkAIEcU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2848 reg.exe 2272 reg.exe 2592 reg.exe 2680 reg.exe 648 reg.exe 2852 reg.exe 892 reg.exe 2712 reg.exe 2948 reg.exe 2624 reg.exe 296 reg.exe 1664 reg.exe 1580 reg.exe 848 reg.exe 1244 reg.exe 2140 reg.exe 2388 reg.exe 2988 reg.exe 2932 reg.exe 2604 reg.exe 1388 reg.exe 2992 reg.exe 2524 reg.exe 2160 reg.exe 1664 reg.exe 1288 reg.exe 664 reg.exe 2664 reg.exe 1784 reg.exe 2208 reg.exe 2596 reg.exe 2872 reg.exe 540 reg.exe 3004 reg.exe 2164 reg.exe 1332 reg.exe 1752 reg.exe 2020 reg.exe 2232 reg.exe 768 reg.exe 1608 reg.exe 2660 reg.exe 1620 reg.exe 2572 reg.exe 2228 reg.exe 284 reg.exe 2556 reg.exe 2960 reg.exe 1312 reg.exe 3048 reg.exe 940 reg.exe 2248 reg.exe 536 reg.exe 2412 reg.exe 2032 reg.exe 2872 reg.exe 1724 reg.exe 2848 reg.exe 3060 reg.exe 1932 reg.exe 1656 reg.exe 1668 reg.exe 2060 reg.exe 2088 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2236 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2236 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1436 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1436 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2564 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2564 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 972 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 972 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2372 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2372 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2624 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2624 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2964 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2964 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1784 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1784 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 640 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 640 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 340 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 340 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2444 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2444 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2164 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2164 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1720 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1720 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2952 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2952 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1704 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1704 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2196 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2196 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1724 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1724 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1244 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1244 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2136 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2136 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1988 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1988 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2864 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2864 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 940 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 940 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2788 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2788 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 3008 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 3008 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2456 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2456 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1968 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 1968 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2816 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2816 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2744 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2744 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2588 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2588 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2224 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 2224 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1500 psQUEsoQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe 1500 psQUEsoQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1500 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 28 PID 1032 wrote to memory of 1500 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 28 PID 1032 wrote to memory of 1500 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 28 PID 1032 wrote to memory of 1500 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 28 PID 1032 wrote to memory of 2428 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 29 PID 1032 wrote to memory of 2428 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 29 PID 1032 wrote to memory of 2428 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 29 PID 1032 wrote to memory of 2428 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 29 PID 1032 wrote to memory of 2948 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 30 PID 1032 wrote to memory of 2948 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 30 PID 1032 wrote to memory of 2948 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 30 PID 1032 wrote to memory of 2948 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 30 PID 1032 wrote to memory of 3008 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 32 PID 1032 wrote to memory of 3008 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 32 PID 1032 wrote to memory of 3008 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 32 PID 1032 wrote to memory of 3008 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 32 PID 1032 wrote to memory of 3032 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 34 PID 1032 wrote to memory of 3032 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 34 PID 1032 wrote to memory of 3032 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 34 PID 1032 wrote to memory of 3032 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 34 PID 2948 wrote to memory of 2404 2948 cmd.exe 33 PID 2948 wrote to memory of 2404 2948 cmd.exe 33 PID 2948 wrote to memory of 2404 2948 cmd.exe 33 PID 2948 wrote to memory of 2404 2948 cmd.exe 33 PID 1032 wrote to memory of 2888 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 35 PID 1032 wrote to memory of 2888 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 35 PID 1032 wrote to memory of 2888 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 35 PID 1032 wrote to memory of 2888 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 35 PID 1032 wrote to memory of 908 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 36 PID 1032 wrote to memory of 908 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 36 PID 1032 wrote to memory of 908 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 36 PID 1032 wrote to memory of 908 1032 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 36 PID 908 wrote to memory of 2644 908 cmd.exe 41 PID 908 wrote to memory of 2644 908 cmd.exe 41 PID 908 wrote to memory of 2644 908 cmd.exe 41 PID 908 wrote to memory of 2644 908 cmd.exe 41 PID 2404 wrote to memory of 2520 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 42 PID 2404 wrote to memory of 2520 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 42 PID 2404 wrote to memory of 2520 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 42 PID 2404 wrote to memory of 2520 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 42 PID 2520 wrote to memory of 2236 2520 cmd.exe 44 PID 2520 wrote to memory of 2236 2520 cmd.exe 44 PID 2520 wrote to memory of 2236 2520 cmd.exe 44 PID 2520 wrote to memory of 2236 2520 cmd.exe 44 PID 2404 wrote to memory of 1720 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 45 PID 2404 wrote to memory of 1720 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 45 PID 2404 wrote to memory of 1720 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 45 PID 2404 wrote to memory of 1720 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 45 PID 2404 wrote to memory of 2560 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 46 PID 2404 wrote to memory of 2560 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 46 PID 2404 wrote to memory of 2560 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 46 PID 2404 wrote to memory of 2560 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 46 PID 2404 wrote to memory of 2680 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 47 PID 2404 wrote to memory of 2680 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 47 PID 2404 wrote to memory of 2680 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 47 PID 2404 wrote to memory of 2680 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 47 PID 2404 wrote to memory of 2556 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 48 PID 2404 wrote to memory of 2556 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 48 PID 2404 wrote to memory of 2556 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 48 PID 2404 wrote to memory of 2556 2404 e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe 48 PID 2556 wrote to memory of 1432 2556 cmd.exe 53 PID 2556 wrote to memory of 1432 2556 cmd.exe 53 PID 2556 wrote to memory of 1432 2556 cmd.exe 53 PID 2556 wrote to memory of 1432 2556 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe"C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\DEAoowwc\psQUEsoQ.exe"C:\Users\Admin\DEAoowwc\psQUEsoQ.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1500
-
-
C:\ProgramData\lgMwQUMM\WgkAIEcU.exe"C:\ProgramData\lgMwQUMM\WgkAIEcU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2428
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"2⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"4⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"6⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"8⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"10⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N11⤵
- Suspicious behavior: EnumeratesProcesses
PID:972 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"12⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"14⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"16⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"18⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"20⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N21⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"22⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N23⤵
- Suspicious behavior: EnumeratesProcesses
PID:340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"24⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"26⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"28⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"30⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"32⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"34⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"36⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"38⤵
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"40⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"42⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"44⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"46⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N47⤵
- Suspicious behavior: EnumeratesProcesses
PID:940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"48⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"50⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N51⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"52⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"54⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"56⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"58⤵
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"60⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2588 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"62⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"64⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N65⤵
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"66⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N67⤵PID:2416
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"68⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N69⤵PID:2964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"70⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N71⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"72⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N73⤵PID:1676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"74⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N75⤵PID:3020
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"76⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N77⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"78⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N79⤵PID:2032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"80⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N81⤵PID:1092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"82⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N83⤵PID:1260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"84⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N85⤵PID:1976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"86⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N87⤵
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"88⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N89⤵PID:1532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"90⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N91⤵PID:2016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"92⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N93⤵PID:2636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"94⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N95⤵PID:620
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"96⤵
- System Location Discovery: System Language Discovery
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N97⤵PID:2424
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"98⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N99⤵PID:2160
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"100⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N101⤵PID:1952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"102⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N103⤵PID:2832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"104⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N105⤵PID:2104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"106⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N107⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"108⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N109⤵PID:2056
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"110⤵
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N111⤵PID:2528
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"112⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N113⤵PID:2088
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"114⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N115⤵PID:300
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"116⤵
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N117⤵PID:2992
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"118⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N119⤵PID:2868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"120⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N.exeC:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N121⤵PID:1784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e5389cc88cbeab9a76ce7c3ced02463753d4f9b1d4a6c97572356a80d6031329N"122⤵PID:2724
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-