Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe
Resource
win10v2004-20240802-en
General
-
Target
ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe
-
Size
196KB
-
MD5
bceb210f414ff6adfa63b6debe403510
-
SHA1
18381302ef676cf5fb15a584c4a456ee175db313
-
SHA256
ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16c
-
SHA512
03893003199b087c508a4d141502ec1c60b831ae3a6bef6d92a898a5c8d4472aaee0e294eb469380c51a4cc19d077a5bae7f94aca8bf868f79fe4b9680116f18
-
SSDEEP
3072:5vDJY/eWZqYauFiIfNLCqcyM99OqJ+jtYxpZ5nk7pztomi5BWzGmeWBRcIP6CwX:5qGW0Ts/NbcyU9XJ+jtYd5mBD6X4pn9
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (54) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\Geo\Nation Eicgswkg.exe -
Executes dropped EXE 2 IoCs
pid Process 1644 Eicgswkg.exe 1388 xoQMwUQE.exe -
Loads dropped DLL 20 IoCs
pid Process 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Eicgswkg.exe = "C:\\Users\\Admin\\YossAEEc\\Eicgswkg.exe" ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xoQMwUQE.exe = "C:\\ProgramData\\eGAAsUsg\\xoQMwUQE.exe" ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Eicgswkg.exe = "C:\\Users\\Admin\\YossAEEc\\Eicgswkg.exe" Eicgswkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xoQMwUQE.exe = "C:\\ProgramData\\eGAAsUsg\\xoQMwUQE.exe" xoQMwUQE.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico Eicgswkg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2612 reg.exe 2380 reg.exe 1764 reg.exe 2052 reg.exe 708 reg.exe 2812 reg.exe 2856 reg.exe 2280 reg.exe 2908 reg.exe 1676 reg.exe 2416 reg.exe 2436 reg.exe 1984 reg.exe 1860 reg.exe 1860 reg.exe 1092 reg.exe 2052 reg.exe 1164 reg.exe 1044 reg.exe 2256 reg.exe 932 reg.exe 1968 reg.exe 2724 reg.exe 2028 reg.exe 1784 reg.exe 2572 reg.exe 2204 reg.exe 2508 reg.exe 1496 reg.exe 2436 reg.exe 568 reg.exe 1708 reg.exe 1868 reg.exe 2448 reg.exe 2228 reg.exe 2308 reg.exe 1488 reg.exe 2212 reg.exe 1788 reg.exe 1616 reg.exe 2960 reg.exe 944 reg.exe 2164 reg.exe 1540 reg.exe 236 reg.exe 2276 reg.exe 2620 reg.exe 1736 reg.exe 796 reg.exe 2488 reg.exe 2240 reg.exe 2560 reg.exe 2240 reg.exe 1716 reg.exe 2196 reg.exe 2832 reg.exe 1764 reg.exe 3036 reg.exe 2720 reg.exe 2816 reg.exe 2812 reg.exe 2740 reg.exe 684 reg.exe 796 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2072 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2072 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 340 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 340 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2296 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2296 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 648 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 648 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2992 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2992 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2676 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2676 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2028 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2028 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2280 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2280 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 236 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 236 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 704 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 704 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2268 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2268 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2872 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2872 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2220 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2220 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 1096 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 1096 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 984 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 984 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2832 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2832 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2912 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2912 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 792 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 792 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 936 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 936 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 1436 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 1436 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2828 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2828 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2844 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2844 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2964 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2964 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 268 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 268 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 1332 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 1332 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 1736 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 1736 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2756 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2756 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2820 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2820 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2252 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2252 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1644 Eicgswkg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe 1644 Eicgswkg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1644 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 29 PID 2544 wrote to memory of 1644 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 29 PID 2544 wrote to memory of 1644 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 29 PID 2544 wrote to memory of 1644 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 29 PID 2544 wrote to memory of 1388 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 30 PID 2544 wrote to memory of 1388 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 30 PID 2544 wrote to memory of 1388 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 30 PID 2544 wrote to memory of 1388 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 30 PID 2544 wrote to memory of 2760 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 31 PID 2544 wrote to memory of 2760 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 31 PID 2544 wrote to memory of 2760 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 31 PID 2544 wrote to memory of 2760 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 31 PID 2544 wrote to memory of 2612 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 33 PID 2544 wrote to memory of 2612 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 33 PID 2544 wrote to memory of 2612 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 33 PID 2544 wrote to memory of 2612 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 33 PID 2544 wrote to memory of 1928 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 34 PID 2544 wrote to memory of 1928 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 34 PID 2544 wrote to memory of 1928 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 34 PID 2544 wrote to memory of 1928 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 34 PID 2760 wrote to memory of 2884 2760 cmd.exe 36 PID 2760 wrote to memory of 2884 2760 cmd.exe 36 PID 2760 wrote to memory of 2884 2760 cmd.exe 36 PID 2760 wrote to memory of 2884 2760 cmd.exe 36 PID 2544 wrote to memory of 2860 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 37 PID 2544 wrote to memory of 2860 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 37 PID 2544 wrote to memory of 2860 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 37 PID 2544 wrote to memory of 2860 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 37 PID 2544 wrote to memory of 3016 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 38 PID 2544 wrote to memory of 3016 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 38 PID 2544 wrote to memory of 3016 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 38 PID 2544 wrote to memory of 3016 2544 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 38 PID 3016 wrote to memory of 1092 3016 cmd.exe 42 PID 3016 wrote to memory of 1092 3016 cmd.exe 42 PID 3016 wrote to memory of 1092 3016 cmd.exe 42 PID 3016 wrote to memory of 1092 3016 cmd.exe 42 PID 2884 wrote to memory of 2104 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 43 PID 2884 wrote to memory of 2104 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 43 PID 2884 wrote to memory of 2104 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 43 PID 2884 wrote to memory of 2104 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 43 PID 2104 wrote to memory of 2072 2104 cmd.exe 45 PID 2104 wrote to memory of 2072 2104 cmd.exe 45 PID 2104 wrote to memory of 2072 2104 cmd.exe 45 PID 2104 wrote to memory of 2072 2104 cmd.exe 45 PID 2884 wrote to memory of 2308 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 46 PID 2884 wrote to memory of 2308 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 46 PID 2884 wrote to memory of 2308 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 46 PID 2884 wrote to memory of 2308 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 46 PID 2884 wrote to memory of 2520 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 47 PID 2884 wrote to memory of 2520 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 47 PID 2884 wrote to memory of 2520 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 47 PID 2884 wrote to memory of 2520 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 47 PID 2884 wrote to memory of 1728 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 48 PID 2884 wrote to memory of 1728 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 48 PID 2884 wrote to memory of 1728 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 48 PID 2884 wrote to memory of 1728 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 48 PID 2884 wrote to memory of 3040 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 50 PID 2884 wrote to memory of 3040 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 50 PID 2884 wrote to memory of 3040 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 50 PID 2884 wrote to memory of 3040 2884 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 50 PID 3040 wrote to memory of 2924 3040 cmd.exe 54 PID 3040 wrote to memory of 2924 3040 cmd.exe 54 PID 3040 wrote to memory of 2924 3040 cmd.exe 54 PID 3040 wrote to memory of 2924 3040 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe"C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\YossAEEc\Eicgswkg.exe"C:\Users\Admin\YossAEEc\Eicgswkg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1644
-
-
C:\ProgramData\eGAAsUsg\xoQMwUQE.exe"C:\ProgramData\eGAAsUsg\xoQMwUQE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1388
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"4⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"6⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN7⤵
- Suspicious behavior: EnumeratesProcesses
PID:340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"8⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"10⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN11⤵
- Suspicious behavior: EnumeratesProcesses
PID:648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"12⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"14⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"16⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"18⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN19⤵
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"20⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"22⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN23⤵
- Suspicious behavior: EnumeratesProcesses
PID:236 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"24⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN25⤵
- Suspicious behavior: EnumeratesProcesses
PID:704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"26⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"28⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"30⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"32⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"34⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN35⤵
- Suspicious behavior: EnumeratesProcesses
PID:984 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"36⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"38⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"40⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN41⤵
- Suspicious behavior: EnumeratesProcesses
PID:792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"42⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN43⤵
- Suspicious behavior: EnumeratesProcesses
PID:936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"44⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"46⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"48⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"50⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"52⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN53⤵
- Suspicious behavior: EnumeratesProcesses
PID:268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"54⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"56⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"58⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"60⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"62⤵
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN63⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"64⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN65⤵PID:2728
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"66⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN67⤵PID:2976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"68⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN69⤵PID:3068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"70⤵
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN71⤵PID:1708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"72⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN73⤵PID:2744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"74⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN75⤵PID:1060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"76⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN77⤵PID:2572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"78⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN79⤵PID:2120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"80⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN81⤵PID:1784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"82⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN83⤵PID:2240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"84⤵
- System Location Discovery: System Language Discovery
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN85⤵PID:2652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"86⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN87⤵PID:2536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"88⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN89⤵PID:1060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"90⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN91⤵PID:2572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"92⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN93⤵PID:2560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"94⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN95⤵PID:2848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"96⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN97⤵PID:2732
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"98⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN99⤵PID:1556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"100⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN101⤵PID:2308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"102⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN103⤵PID:2376
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"104⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN105⤵PID:2940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"106⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN107⤵PID:2188
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"108⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN109⤵PID:2176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"110⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN111⤵PID:2060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"112⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN113⤵PID:2776
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"114⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN115⤵
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"116⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN117⤵PID:1968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"118⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN119⤵PID:2916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"120⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN121⤵PID:2112
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"122⤵PID:1488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-