Analysis
-
max time kernel
150s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05-07-2023 16:33
Static task
static1
Behavioral task
behavioral1
Sample
0fc179c84db1f3exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
0fc179c84db1f3exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
0fc179c84db1f3exeexeexeex.exe
-
Size
309KB
-
MD5
0fc179c84db1f3fc59598b40d31ceac6
-
SHA1
24729f8dae98db58e10968676377e9e630803c0d
-
SHA256
513540388b50c5e9552542f7c8612a08d33e9b094e989544c1c60327802c66b4
-
SHA512
2b8a18caaf7947dbbcb46695ecd6d6204c941411cb4dfacc16eeb7dcf5bb2dfc06462bf6332a1819a9ec8fe69358556e350583c0e31fbe5057394988ea6d00ff
-
SSDEEP
6144:PmX9n70CNLYqgFvqczDXUvYIq21Rb3dldybVOBevSGbkL:Pe/4vqvI21Rb3dldybMsKGbkL
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\WaitTrace.png.exe kUAIYoEE.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Control Panel\International\Geo\Nation kUAIYoEE.exe -
Deletes itself 1 IoCs
pid Process 876 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2064 kUAIYoEE.exe 3000 NyQYYcUg.exe -
Loads dropped DLL 20 IoCs
pid Process 2436 0fc179c84db1f3exeexeexeex.exe 2436 0fc179c84db1f3exeexeexeex.exe 2436 0fc179c84db1f3exeexeexeex.exe 2436 0fc179c84db1f3exeexeexeex.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\kUAIYoEE.exe = "C:\\Users\\Admin\\kOoowcUg\\kUAIYoEE.exe" 0fc179c84db1f3exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NyQYYcUg.exe = "C:\\ProgramData\\qUYcMkAI\\NyQYYcUg.exe" 0fc179c84db1f3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\kUAIYoEE.exe = "C:\\Users\\Admin\\kOoowcUg\\kUAIYoEE.exe" kUAIYoEE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NyQYYcUg.exe = "C:\\ProgramData\\qUYcMkAI\\NyQYYcUg.exe" NyQYYcUg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico kUAIYoEE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2940 reg.exe 2172 reg.exe 3028 reg.exe 2080 reg.exe 2512 reg.exe 2884 reg.exe 2156 reg.exe 2652 reg.exe 2944 reg.exe 3028 reg.exe 2780 reg.exe 1744 reg.exe 2528 reg.exe 668 reg.exe 2672 reg.exe 2776 reg.exe 2540 reg.exe 2940 reg.exe 2536 reg.exe 2768 reg.exe 2860 reg.exe 2860 reg.exe 2664 reg.exe 1604 Process not Found 1192 reg.exe 2964 reg.exe 1196 reg.exe 1600 reg.exe 2148 reg.exe 2956 reg.exe 3008 reg.exe 2076 reg.exe 2188 reg.exe 2992 reg.exe 2276 reg.exe 2364 reg.exe 1556 reg.exe 2808 reg.exe 2248 reg.exe 2332 reg.exe 1192 reg.exe 2480 reg.exe 1288 reg.exe 2060 reg.exe 984 reg.exe 2124 reg.exe 2772 reg.exe 2872 reg.exe 920 reg.exe 2344 reg.exe 2016 reg.exe 1184 reg.exe 920 reg.exe 1332 reg.exe 2508 Process not Found 3036 reg.exe 1868 reg.exe 972 reg.exe 2236 reg.exe 944 reg.exe 1144 reg.exe 1792 reg.exe 1888 reg.exe 2588 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2436 0fc179c84db1f3exeexeexeex.exe 2436 0fc179c84db1f3exeexeexeex.exe 3032 0fc179c84db1f3exeexeexeex.exe 3032 0fc179c84db1f3exeexeexeex.exe 2760 0fc179c84db1f3exeexeexeex.exe 2760 0fc179c84db1f3exeexeexeex.exe 2184 0fc179c84db1f3exeexeexeex.exe 2184 0fc179c84db1f3exeexeexeex.exe 2876 0fc179c84db1f3exeexeexeex.exe 2876 0fc179c84db1f3exeexeexeex.exe 3060 0fc179c84db1f3exeexeexeex.exe 3060 0fc179c84db1f3exeexeexeex.exe 2044 0fc179c84db1f3exeexeexeex.exe 2044 0fc179c84db1f3exeexeexeex.exe 2448 0fc179c84db1f3exeexeexeex.exe 2448 0fc179c84db1f3exeexeexeex.exe 2332 0fc179c84db1f3exeexeexeex.exe 2332 0fc179c84db1f3exeexeexeex.exe 2636 0fc179c84db1f3exeexeexeex.exe 2636 0fc179c84db1f3exeexeexeex.exe 2796 0fc179c84db1f3exeexeexeex.exe 2796 0fc179c84db1f3exeexeexeex.exe 2276 0fc179c84db1f3exeexeexeex.exe 2276 0fc179c84db1f3exeexeexeex.exe 1900 0fc179c84db1f3exeexeexeex.exe 1900 0fc179c84db1f3exeexeexeex.exe 2076 0fc179c84db1f3exeexeexeex.exe 2076 0fc179c84db1f3exeexeexeex.exe 2672 0fc179c84db1f3exeexeexeex.exe 2672 0fc179c84db1f3exeexeexeex.exe 552 0fc179c84db1f3exeexeexeex.exe 552 0fc179c84db1f3exeexeexeex.exe 2888 0fc179c84db1f3exeexeexeex.exe 2888 0fc179c84db1f3exeexeexeex.exe 2688 0fc179c84db1f3exeexeexeex.exe 2688 0fc179c84db1f3exeexeexeex.exe 2440 0fc179c84db1f3exeexeexeex.exe 2440 0fc179c84db1f3exeexeexeex.exe 1440 0fc179c84db1f3exeexeexeex.exe 1440 0fc179c84db1f3exeexeexeex.exe 1876 0fc179c84db1f3exeexeexeex.exe 1876 0fc179c84db1f3exeexeexeex.exe 2684 0fc179c84db1f3exeexeexeex.exe 2684 0fc179c84db1f3exeexeexeex.exe 2724 0fc179c84db1f3exeexeexeex.exe 2724 0fc179c84db1f3exeexeexeex.exe 2868 0fc179c84db1f3exeexeexeex.exe 2868 0fc179c84db1f3exeexeexeex.exe 656 0fc179c84db1f3exeexeexeex.exe 656 0fc179c84db1f3exeexeexeex.exe 3068 0fc179c84db1f3exeexeexeex.exe 3068 0fc179c84db1f3exeexeexeex.exe 2656 0fc179c84db1f3exeexeexeex.exe 2656 0fc179c84db1f3exeexeexeex.exe 2692 0fc179c84db1f3exeexeexeex.exe 2692 0fc179c84db1f3exeexeexeex.exe 1624 0fc179c84db1f3exeexeexeex.exe 1624 0fc179c84db1f3exeexeexeex.exe 2716 0fc179c84db1f3exeexeexeex.exe 2716 0fc179c84db1f3exeexeexeex.exe 468 0fc179c84db1f3exeexeexeex.exe 468 0fc179c84db1f3exeexeexeex.exe 936 0fc179c84db1f3exeexeexeex.exe 936 0fc179c84db1f3exeexeexeex.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe 2064 kUAIYoEE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2064 2436 0fc179c84db1f3exeexeexeex.exe 28 PID 2436 wrote to memory of 2064 2436 0fc179c84db1f3exeexeexeex.exe 28 PID 2436 wrote to memory of 2064 2436 0fc179c84db1f3exeexeexeex.exe 28 PID 2436 wrote to memory of 2064 2436 0fc179c84db1f3exeexeexeex.exe 28 PID 2436 wrote to memory of 3000 2436 0fc179c84db1f3exeexeexeex.exe 29 PID 2436 wrote to memory of 3000 2436 0fc179c84db1f3exeexeexeex.exe 29 PID 2436 wrote to memory of 3000 2436 0fc179c84db1f3exeexeexeex.exe 29 PID 2436 wrote to memory of 3000 2436 0fc179c84db1f3exeexeexeex.exe 29 PID 2436 wrote to memory of 1736 2436 0fc179c84db1f3exeexeexeex.exe 30 PID 2436 wrote to memory of 1736 2436 0fc179c84db1f3exeexeexeex.exe 30 PID 2436 wrote to memory of 1736 2436 0fc179c84db1f3exeexeexeex.exe 30 PID 2436 wrote to memory of 1736 2436 0fc179c84db1f3exeexeexeex.exe 30 PID 1736 wrote to memory of 3032 1736 cmd.exe 32 PID 1736 wrote to memory of 3032 1736 cmd.exe 32 PID 1736 wrote to memory of 3032 1736 cmd.exe 32 PID 1736 wrote to memory of 3032 1736 cmd.exe 32 PID 2436 wrote to memory of 2204 2436 0fc179c84db1f3exeexeexeex.exe 33 PID 2436 wrote to memory of 2204 2436 0fc179c84db1f3exeexeexeex.exe 33 PID 2436 wrote to memory of 2204 2436 0fc179c84db1f3exeexeexeex.exe 33 PID 2436 wrote to memory of 2204 2436 0fc179c84db1f3exeexeexeex.exe 33 PID 2436 wrote to memory of 1744 2436 0fc179c84db1f3exeexeexeex.exe 34 PID 2436 wrote to memory of 1744 2436 0fc179c84db1f3exeexeexeex.exe 34 PID 2436 wrote to memory of 1744 2436 0fc179c84db1f3exeexeexeex.exe 34 PID 2436 wrote to memory of 1744 2436 0fc179c84db1f3exeexeexeex.exe 34 PID 2436 wrote to memory of 1316 2436 0fc179c84db1f3exeexeexeex.exe 36 PID 2436 wrote to memory of 1316 2436 0fc179c84db1f3exeexeexeex.exe 36 PID 2436 wrote to memory of 1316 2436 0fc179c84db1f3exeexeexeex.exe 36 PID 2436 wrote to memory of 1316 2436 0fc179c84db1f3exeexeexeex.exe 36 PID 2436 wrote to memory of 1304 2436 0fc179c84db1f3exeexeexeex.exe 40 PID 2436 wrote to memory of 1304 2436 0fc179c84db1f3exeexeexeex.exe 40 PID 2436 wrote to memory of 1304 2436 0fc179c84db1f3exeexeexeex.exe 40 PID 2436 wrote to memory of 1304 2436 0fc179c84db1f3exeexeexeex.exe 40 PID 1304 wrote to memory of 2848 1304 cmd.exe 41 PID 1304 wrote to memory of 2848 1304 cmd.exe 41 PID 1304 wrote to memory of 2848 1304 cmd.exe 41 PID 1304 wrote to memory of 2848 1304 cmd.exe 41 PID 3032 wrote to memory of 2640 3032 0fc179c84db1f3exeexeexeex.exe 42 PID 3032 wrote to memory of 2640 3032 0fc179c84db1f3exeexeexeex.exe 42 PID 3032 wrote to memory of 2640 3032 0fc179c84db1f3exeexeexeex.exe 42 PID 3032 wrote to memory of 2640 3032 0fc179c84db1f3exeexeexeex.exe 42 PID 2640 wrote to memory of 2760 2640 cmd.exe 44 PID 2640 wrote to memory of 2760 2640 cmd.exe 44 PID 2640 wrote to memory of 2760 2640 cmd.exe 44 PID 2640 wrote to memory of 2760 2640 cmd.exe 44 PID 3032 wrote to memory of 2652 3032 0fc179c84db1f3exeexeexeex.exe 45 PID 3032 wrote to memory of 2652 3032 0fc179c84db1f3exeexeexeex.exe 45 PID 3032 wrote to memory of 2652 3032 0fc179c84db1f3exeexeexeex.exe 45 PID 3032 wrote to memory of 2652 3032 0fc179c84db1f3exeexeexeex.exe 45 PID 3032 wrote to memory of 3008 3032 0fc179c84db1f3exeexeexeex.exe 47 PID 3032 wrote to memory of 3008 3032 0fc179c84db1f3exeexeexeex.exe 47 PID 3032 wrote to memory of 3008 3032 0fc179c84db1f3exeexeexeex.exe 47 PID 3032 wrote to memory of 3008 3032 0fc179c84db1f3exeexeexeex.exe 47 PID 3032 wrote to memory of 1196 3032 0fc179c84db1f3exeexeexeex.exe 48 PID 3032 wrote to memory of 1196 3032 0fc179c84db1f3exeexeexeex.exe 48 PID 3032 wrote to memory of 1196 3032 0fc179c84db1f3exeexeexeex.exe 48 PID 3032 wrote to memory of 1196 3032 0fc179c84db1f3exeexeexeex.exe 48 PID 3032 wrote to memory of 2764 3032 0fc179c84db1f3exeexeexeex.exe 50 PID 3032 wrote to memory of 2764 3032 0fc179c84db1f3exeexeexeex.exe 50 PID 3032 wrote to memory of 2764 3032 0fc179c84db1f3exeexeexeex.exe 50 PID 3032 wrote to memory of 2764 3032 0fc179c84db1f3exeexeexeex.exe 50 PID 2764 wrote to memory of 2536 2764 cmd.exe 53 PID 2764 wrote to memory of 2536 2764 cmd.exe 53 PID 2764 wrote to memory of 2536 2764 cmd.exe 53 PID 2764 wrote to memory of 2536 2764 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\kOoowcUg\kUAIYoEE.exe"C:\Users\Admin\kOoowcUg\kUAIYoEE.exe"2⤵
- Modifies extensions of user files
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2064
-
-
C:\ProgramData\qUYcMkAI\NyQYYcUg.exe"C:\ProgramData\qUYcMkAI\NyQYYcUg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3000
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"6⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"8⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"10⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"12⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"14⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"16⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"18⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"20⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"22⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"24⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"26⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"28⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"30⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"32⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"34⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"36⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"38⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"40⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"42⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"44⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"46⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"48⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"50⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"52⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"54⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"56⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"58⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"60⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"62⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"64⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex65⤵PID:2832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"66⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex67⤵PID:2136
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"68⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex69⤵PID:1824
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"70⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex71⤵PID:2056
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"72⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex73⤵PID:2240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"74⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex75⤵PID:2088
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"76⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex77⤵PID:1708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"78⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex79⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"80⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex81⤵PID:2340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"82⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex83⤵PID:1504
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"84⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex85⤵PID:2652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"86⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex87⤵PID:1736
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"88⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex89⤵PID:2104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"90⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex91⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"92⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex93⤵PID:1960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"94⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex95⤵PID:2408
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"96⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex97⤵PID:2752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"98⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex99⤵PID:268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"100⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex101⤵PID:2248
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"102⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex103⤵PID:2224
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"104⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex105⤵PID:2860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"106⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex107⤵PID:2132
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"108⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex109⤵PID:1116
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"110⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex111⤵PID:2656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"112⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex113⤵PID:1456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"114⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex115⤵PID:1440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"116⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex117⤵PID:2924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"118⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex119⤵PID:2300
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"120⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex121⤵PID:1716
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0fc179c84db1f3exeexeexeex"122⤵PID:740
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-