Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe
Resource
win10v2004-20241007-en
General
-
Target
e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe
-
Size
248KB
-
MD5
3896bcc4c20bec2e4063a7ecc90ebe77
-
SHA1
2373285cd429b443a6b633534ba913ecc9124052
-
SHA256
e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7
-
SHA512
3cc57fd7eadbd18ac81c788f4b9bb98e09dd1d0e8b034c6d8c313e97ce29fab9f89e42de781c03c64b92695a36c581ffb96a314bf8b6e1ccf02dd0ba3c170ccd
-
SSDEEP
3072:PbQd+vjei9IACUL4xfG+AzQTTxw9zEVNu/QzQu2lLWJsHYBTfaaC6MG1fWFUa20N:Ucvyi9lMXAzQTTNaZbpiTfaD4fy/28/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (59) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\Geo\Nation XcIAgAwU.exe -
Deletes itself 1 IoCs
pid Process 2180 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2216 XcIAgAwU.exe 2804 oKoAYMwU.exe -
Loads dropped DLL 20 IoCs
pid Process 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\XcIAgAwU.exe = "C:\\Users\\Admin\\uEUAMgsM\\XcIAgAwU.exe" e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oKoAYMwU.exe = "C:\\ProgramData\\VqQwwkAk\\oKoAYMwU.exe" e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\XcIAgAwU.exe = "C:\\Users\\Admin\\uEUAMgsM\\XcIAgAwU.exe" XcIAgAwU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oKoAYMwU.exe = "C:\\ProgramData\\VqQwwkAk\\oKoAYMwU.exe" oKoAYMwU.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico XcIAgAwU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oKoAYMwU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XcIAgAwU.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2592 reg.exe 1448 reg.exe 2188 reg.exe 2400 reg.exe 2336 reg.exe 304 reg.exe 2144 reg.exe 2792 reg.exe 2828 reg.exe 1612 reg.exe 3040 reg.exe 2008 reg.exe 3060 reg.exe 2212 reg.exe 344 reg.exe 3044 reg.exe 1744 reg.exe 2760 reg.exe 2824 reg.exe 2736 reg.exe 2184 reg.exe 1640 reg.exe 1020 reg.exe 2428 reg.exe 2072 reg.exe 2376 reg.exe 2760 reg.exe 2020 reg.exe 2400 reg.exe 3044 reg.exe 2924 reg.exe 1596 reg.exe 2008 reg.exe 2200 reg.exe 1172 reg.exe 1988 reg.exe 3032 reg.exe 2732 reg.exe 2824 reg.exe 2760 reg.exe 316 reg.exe 2312 reg.exe 1740 reg.exe 1896 reg.exe 1036 reg.exe 2436 reg.exe 2316 reg.exe 2960 reg.exe 2944 reg.exe 2952 reg.exe 2124 reg.exe 2592 reg.exe 2144 reg.exe 1632 reg.exe 2644 reg.exe 1124 reg.exe 1444 reg.exe 2848 reg.exe 2280 reg.exe 2068 reg.exe 1588 reg.exe 1604 reg.exe 2260 reg.exe 1512 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2500 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2500 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1164 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1164 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2196 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2196 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1924 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1924 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1732 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1732 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1912 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1912 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2208 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2208 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2072 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2072 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1616 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1616 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 660 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 660 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2780 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2780 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 840 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 840 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1836 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1836 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1164 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1164 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1056 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1056 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1500 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1500 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2676 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2676 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2920 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2920 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2364 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2364 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 616 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 616 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1532 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1532 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1816 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1816 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3028 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3028 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1084 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1084 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 756 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 756 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2472 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2472 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 996 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 996 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2420 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2420 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2480 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2480 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2216 XcIAgAwU.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe 2216 XcIAgAwU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2216 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 30 PID 2744 wrote to memory of 2216 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 30 PID 2744 wrote to memory of 2216 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 30 PID 2744 wrote to memory of 2216 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 30 PID 2744 wrote to memory of 2804 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 31 PID 2744 wrote to memory of 2804 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 31 PID 2744 wrote to memory of 2804 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 31 PID 2744 wrote to memory of 2804 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 31 PID 2744 wrote to memory of 2812 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 32 PID 2744 wrote to memory of 2812 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 32 PID 2744 wrote to memory of 2812 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 32 PID 2744 wrote to memory of 2812 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 32 PID 2744 wrote to memory of 2796 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 34 PID 2744 wrote to memory of 2796 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 34 PID 2744 wrote to memory of 2796 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 34 PID 2744 wrote to memory of 2796 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 34 PID 2744 wrote to memory of 2848 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 35 PID 2744 wrote to memory of 2848 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 35 PID 2744 wrote to memory of 2848 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 35 PID 2744 wrote to memory of 2848 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 35 PID 2744 wrote to memory of 2184 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 36 PID 2744 wrote to memory of 2184 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 36 PID 2744 wrote to memory of 2184 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 36 PID 2744 wrote to memory of 2184 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 36 PID 2744 wrote to memory of 3012 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 37 PID 2744 wrote to memory of 3012 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 37 PID 2744 wrote to memory of 3012 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 37 PID 2744 wrote to memory of 3012 2744 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 37 PID 2812 wrote to memory of 2664 2812 cmd.exe 42 PID 2812 wrote to memory of 2664 2812 cmd.exe 42 PID 2812 wrote to memory of 2664 2812 cmd.exe 42 PID 2812 wrote to memory of 2664 2812 cmd.exe 42 PID 3012 wrote to memory of 2680 3012 cmd.exe 43 PID 3012 wrote to memory of 2680 3012 cmd.exe 43 PID 3012 wrote to memory of 2680 3012 cmd.exe 43 PID 3012 wrote to memory of 2680 3012 cmd.exe 43 PID 2664 wrote to memory of 2760 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 44 PID 2664 wrote to memory of 2760 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 44 PID 2664 wrote to memory of 2760 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 44 PID 2664 wrote to memory of 2760 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 44 PID 2760 wrote to memory of 2500 2760 cmd.exe 46 PID 2760 wrote to memory of 2500 2760 cmd.exe 46 PID 2760 wrote to memory of 2500 2760 cmd.exe 46 PID 2760 wrote to memory of 2500 2760 cmd.exe 46 PID 2664 wrote to memory of 444 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 47 PID 2664 wrote to memory of 444 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 47 PID 2664 wrote to memory of 444 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 47 PID 2664 wrote to memory of 444 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 47 PID 2664 wrote to memory of 1084 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 48 PID 2664 wrote to memory of 1084 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 48 PID 2664 wrote to memory of 1084 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 48 PID 2664 wrote to memory of 1084 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 48 PID 2664 wrote to memory of 1960 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 50 PID 2664 wrote to memory of 1960 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 50 PID 2664 wrote to memory of 1960 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 50 PID 2664 wrote to memory of 1960 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 50 PID 2664 wrote to memory of 3004 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 51 PID 2664 wrote to memory of 3004 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 51 PID 2664 wrote to memory of 3004 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 51 PID 2664 wrote to memory of 3004 2664 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 51 PID 3004 wrote to memory of 2204 3004 cmd.exe 55 PID 3004 wrote to memory of 2204 3004 cmd.exe 55 PID 3004 wrote to memory of 2204 3004 cmd.exe 55 PID 3004 wrote to memory of 2204 3004 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe"C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\uEUAMgsM\XcIAgAwU.exe"C:\Users\Admin\uEUAMgsM\XcIAgAwU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2216
-
-
C:\ProgramData\VqQwwkAk\oKoAYMwU.exe"C:\ProgramData\VqQwwkAk\oKoAYMwU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"2⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf73⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"4⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf75⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"6⤵
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf77⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"8⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf79⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"10⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf711⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"12⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf713⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"14⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf715⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"16⤵
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf717⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"18⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf719⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"20⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf721⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"22⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf723⤵
- Suspicious behavior: EnumeratesProcesses
PID:660 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"24⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf725⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"26⤵
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf727⤵
- Suspicious behavior: EnumeratesProcesses
PID:840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"28⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf729⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"30⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf731⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"32⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf733⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"34⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf735⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"36⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf737⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"38⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf739⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"40⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf741⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"42⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf743⤵
- Suspicious behavior: EnumeratesProcesses
PID:616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"44⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf745⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"46⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf747⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"48⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf749⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"50⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf751⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"52⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf753⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"54⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf755⤵
- Suspicious behavior: EnumeratesProcesses
PID:756 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"56⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf757⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"58⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf759⤵
- Suspicious behavior: EnumeratesProcesses
PID:996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"60⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf761⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"62⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf763⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"64⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf765⤵PID:2312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"66⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf767⤵PID:1908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"68⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf769⤵PID:2336
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"70⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf771⤵PID:3032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"72⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf773⤵
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"74⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf775⤵PID:596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"76⤵
- System Location Discovery: System Language Discovery
PID:768 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf777⤵PID:1508
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"78⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf779⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"80⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf781⤵PID:988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"82⤵PID:304
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf783⤵PID:780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"84⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf785⤵PID:1420
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"86⤵
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf787⤵PID:2440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"88⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf789⤵PID:584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"90⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf791⤵PID:2436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"92⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf793⤵PID:1472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"94⤵
- System Location Discovery: System Language Discovery
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf795⤵PID:2516
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"96⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf797⤵PID:2400
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"98⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf799⤵PID:2536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"100⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7101⤵PID:1084
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"102⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7103⤵PID:1880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"104⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7105⤵PID:1444
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"106⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7107⤵PID:2608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"108⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7109⤵PID:3000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"110⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7111⤵PID:2676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"112⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7113⤵PID:768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"114⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7115⤵PID:840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"116⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7117⤵PID:1084
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"118⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7119⤵PID:1768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"120⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7121⤵PID:2464
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"122⤵PID:2668
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-