Analysis
-
max time kernel
149s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
2b255a0ff6c786exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2b255a0ff6c786exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
2b255a0ff6c786exeexeexeex.exe
-
Size
200KB
-
MD5
2b255a0ff6c786154bba071ab97257f6
-
SHA1
67bdf070bcec7e0a15c06e7c5820dd8d4663ee38
-
SHA256
12e3673e6b153704617c8a0720ce9f5f383eb58c49a7d1873acd93d1149b706d
-
SHA512
e87caeddd0007e6ed0075cc9e8f7e425a9f0ada85c1df23029ce4d60091fe5dba56328c56740940ca9f9ff4083107d209f72848a399743b7385b1dc92d038a15
-
SSDEEP
3072:Gv/sppKZ8AhPAOX/S99ItwhoorkcAZ1PwTrfhIJCRC6xvyF4Q2Ci5MuqAtBS8:NjKhH/9tioorAPwfhIJIxKF4QV+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 560 mCEgwUMY.exe 2324 uuoIcEUE.exe -
Loads dropped DLL 20 IoCs
pid Process 2216 2b255a0ff6c786exeexeexeex.exe 2216 2b255a0ff6c786exeexeexeex.exe 2216 2b255a0ff6c786exeexeexeex.exe 2216 2b255a0ff6c786exeexeexeex.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe 560 mCEgwUMY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Run\mCEgwUMY.exe = "C:\\Users\\Admin\\xWUEoMEQ\\mCEgwUMY.exe" 2b255a0ff6c786exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uuoIcEUE.exe = "C:\\ProgramData\\YSwsoIoI\\uuoIcEUE.exe" 2b255a0ff6c786exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uuoIcEUE.exe = "C:\\ProgramData\\YSwsoIoI\\uuoIcEUE.exe" uuoIcEUE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Run\mCEgwUMY.exe = "C:\\Users\\Admin\\xWUEoMEQ\\mCEgwUMY.exe" mCEgwUMY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2520 reg.exe 2608 reg.exe 2832 reg.exe 2652 reg.exe 3028 reg.exe 2436 reg.exe 2472 reg.exe 1364 reg.exe 1232 reg.exe 2424 reg.exe 1460 reg.exe 2960 reg.exe 2636 reg.exe 280 reg.exe 1976 reg.exe 3068 Process not Found 2060 Process not Found 2612 Process not Found 1048 reg.exe 2732 reg.exe 2880 Process not Found 1176 reg.exe 2996 reg.exe 1560 reg.exe 2780 reg.exe 2060 reg.exe 1280 reg.exe 2500 reg.exe 3044 reg.exe 2656 Process not Found 1704 reg.exe 1308 reg.exe 944 reg.exe 2632 reg.exe 736 reg.exe 2816 reg.exe 3044 reg.exe 1948 reg.exe 2144 reg.exe 1352 reg.exe 2880 reg.exe 2468 reg.exe 1104 reg.exe 2736 reg.exe 824 reg.exe 1560 reg.exe 3008 reg.exe 1368 reg.exe 2984 reg.exe 1580 reg.exe 660 reg.exe 1100 reg.exe 736 reg.exe 1708 reg.exe 2732 reg.exe 1160 reg.exe 996 reg.exe 2948 reg.exe 2952 reg.exe 1052 reg.exe 2836 reg.exe 2524 reg.exe 2192 Process not Found 300 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2216 2b255a0ff6c786exeexeexeex.exe 2216 2b255a0ff6c786exeexeexeex.exe 2164 2b255a0ff6c786exeexeexeex.exe 2164 2b255a0ff6c786exeexeexeex.exe 2780 2b255a0ff6c786exeexeexeex.exe 2780 2b255a0ff6c786exeexeexeex.exe 2512 2b255a0ff6c786exeexeexeex.exe 2512 2b255a0ff6c786exeexeexeex.exe 1796 2b255a0ff6c786exeexeexeex.exe 1796 2b255a0ff6c786exeexeexeex.exe 2292 2b255a0ff6c786exeexeexeex.exe 2292 2b255a0ff6c786exeexeexeex.exe 1144 2b255a0ff6c786exeexeexeex.exe 1144 2b255a0ff6c786exeexeexeex.exe 2284 2b255a0ff6c786exeexeexeex.exe 2284 2b255a0ff6c786exeexeexeex.exe 2908 2b255a0ff6c786exeexeexeex.exe 2908 2b255a0ff6c786exeexeexeex.exe 1692 2b255a0ff6c786exeexeexeex.exe 1692 2b255a0ff6c786exeexeexeex.exe 1600 2b255a0ff6c786exeexeexeex.exe 1600 2b255a0ff6c786exeexeexeex.exe 1796 2b255a0ff6c786exeexeexeex.exe 1796 2b255a0ff6c786exeexeexeex.exe 2116 2b255a0ff6c786exeexeexeex.exe 2116 2b255a0ff6c786exeexeexeex.exe 2268 2b255a0ff6c786exeexeexeex.exe 2268 2b255a0ff6c786exeexeexeex.exe 1620 2b255a0ff6c786exeexeexeex.exe 1620 2b255a0ff6c786exeexeexeex.exe 1456 2b255a0ff6c786exeexeexeex.exe 1456 2b255a0ff6c786exeexeexeex.exe 2716 2b255a0ff6c786exeexeexeex.exe 2716 2b255a0ff6c786exeexeexeex.exe 852 2b255a0ff6c786exeexeexeex.exe 852 2b255a0ff6c786exeexeexeex.exe 1100 2b255a0ff6c786exeexeexeex.exe 1100 2b255a0ff6c786exeexeexeex.exe 2172 2b255a0ff6c786exeexeexeex.exe 2172 2b255a0ff6c786exeexeexeex.exe 2656 2b255a0ff6c786exeexeexeex.exe 2656 2b255a0ff6c786exeexeexeex.exe 2692 2b255a0ff6c786exeexeexeex.exe 2692 2b255a0ff6c786exeexeexeex.exe 2480 2b255a0ff6c786exeexeexeex.exe 2480 2b255a0ff6c786exeexeexeex.exe 2872 2b255a0ff6c786exeexeexeex.exe 2872 2b255a0ff6c786exeexeexeex.exe 812 2b255a0ff6c786exeexeexeex.exe 812 2b255a0ff6c786exeexeexeex.exe 620 2b255a0ff6c786exeexeexeex.exe 620 2b255a0ff6c786exeexeexeex.exe 2884 2b255a0ff6c786exeexeexeex.exe 2884 2b255a0ff6c786exeexeexeex.exe 2620 2b255a0ff6c786exeexeexeex.exe 2620 2b255a0ff6c786exeexeexeex.exe 960 2b255a0ff6c786exeexeexeex.exe 960 2b255a0ff6c786exeexeexeex.exe 1032 2b255a0ff6c786exeexeexeex.exe 1032 2b255a0ff6c786exeexeexeex.exe 736 2b255a0ff6c786exeexeexeex.exe 736 2b255a0ff6c786exeexeexeex.exe 1064 2b255a0ff6c786exeexeexeex.exe 1064 2b255a0ff6c786exeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 560 2216 2b255a0ff6c786exeexeexeex.exe 28 PID 2216 wrote to memory of 560 2216 2b255a0ff6c786exeexeexeex.exe 28 PID 2216 wrote to memory of 560 2216 2b255a0ff6c786exeexeexeex.exe 28 PID 2216 wrote to memory of 560 2216 2b255a0ff6c786exeexeexeex.exe 28 PID 2216 wrote to memory of 2324 2216 2b255a0ff6c786exeexeexeex.exe 29 PID 2216 wrote to memory of 2324 2216 2b255a0ff6c786exeexeexeex.exe 29 PID 2216 wrote to memory of 2324 2216 2b255a0ff6c786exeexeexeex.exe 29 PID 2216 wrote to memory of 2324 2216 2b255a0ff6c786exeexeexeex.exe 29 PID 2216 wrote to memory of 660 2216 2b255a0ff6c786exeexeexeex.exe 30 PID 2216 wrote to memory of 660 2216 2b255a0ff6c786exeexeexeex.exe 30 PID 2216 wrote to memory of 660 2216 2b255a0ff6c786exeexeexeex.exe 30 PID 2216 wrote to memory of 660 2216 2b255a0ff6c786exeexeexeex.exe 30 PID 660 wrote to memory of 2164 660 cmd.exe 32 PID 660 wrote to memory of 2164 660 cmd.exe 32 PID 660 wrote to memory of 2164 660 cmd.exe 32 PID 660 wrote to memory of 2164 660 cmd.exe 32 PID 2216 wrote to memory of 2940 2216 2b255a0ff6c786exeexeexeex.exe 33 PID 2216 wrote to memory of 2940 2216 2b255a0ff6c786exeexeexeex.exe 33 PID 2216 wrote to memory of 2940 2216 2b255a0ff6c786exeexeexeex.exe 33 PID 2216 wrote to memory of 2940 2216 2b255a0ff6c786exeexeexeex.exe 33 PID 2216 wrote to memory of 2900 2216 2b255a0ff6c786exeexeexeex.exe 34 PID 2216 wrote to memory of 2900 2216 2b255a0ff6c786exeexeexeex.exe 34 PID 2216 wrote to memory of 2900 2216 2b255a0ff6c786exeexeexeex.exe 34 PID 2216 wrote to memory of 2900 2216 2b255a0ff6c786exeexeexeex.exe 34 PID 2216 wrote to memory of 2968 2216 2b255a0ff6c786exeexeexeex.exe 36 PID 2216 wrote to memory of 2968 2216 2b255a0ff6c786exeexeexeex.exe 36 PID 2216 wrote to memory of 2968 2216 2b255a0ff6c786exeexeexeex.exe 36 PID 2216 wrote to memory of 2968 2216 2b255a0ff6c786exeexeexeex.exe 36 PID 2216 wrote to memory of 2264 2216 2b255a0ff6c786exeexeexeex.exe 39 PID 2216 wrote to memory of 2264 2216 2b255a0ff6c786exeexeexeex.exe 39 PID 2216 wrote to memory of 2264 2216 2b255a0ff6c786exeexeexeex.exe 39 PID 2216 wrote to memory of 2264 2216 2b255a0ff6c786exeexeexeex.exe 39 PID 2264 wrote to memory of 1192 2264 cmd.exe 41 PID 2264 wrote to memory of 1192 2264 cmd.exe 41 PID 2264 wrote to memory of 1192 2264 cmd.exe 41 PID 2264 wrote to memory of 1192 2264 cmd.exe 41 PID 2164 wrote to memory of 2644 2164 2b255a0ff6c786exeexeexeex.exe 42 PID 2164 wrote to memory of 2644 2164 2b255a0ff6c786exeexeexeex.exe 42 PID 2164 wrote to memory of 2644 2164 2b255a0ff6c786exeexeexeex.exe 42 PID 2164 wrote to memory of 2644 2164 2b255a0ff6c786exeexeexeex.exe 42 PID 2644 wrote to memory of 2780 2644 cmd.exe 44 PID 2644 wrote to memory of 2780 2644 cmd.exe 44 PID 2644 wrote to memory of 2780 2644 cmd.exe 44 PID 2644 wrote to memory of 2780 2644 cmd.exe 44 PID 2164 wrote to memory of 2792 2164 2b255a0ff6c786exeexeexeex.exe 45 PID 2164 wrote to memory of 2792 2164 2b255a0ff6c786exeexeexeex.exe 45 PID 2164 wrote to memory of 2792 2164 2b255a0ff6c786exeexeexeex.exe 45 PID 2164 wrote to memory of 2792 2164 2b255a0ff6c786exeexeexeex.exe 45 PID 2164 wrote to memory of 2700 2164 2b255a0ff6c786exeexeexeex.exe 46 PID 2164 wrote to memory of 2700 2164 2b255a0ff6c786exeexeexeex.exe 46 PID 2164 wrote to memory of 2700 2164 2b255a0ff6c786exeexeexeex.exe 46 PID 2164 wrote to memory of 2700 2164 2b255a0ff6c786exeexeexeex.exe 46 PID 2164 wrote to memory of 2084 2164 2b255a0ff6c786exeexeexeex.exe 50 PID 2164 wrote to memory of 2084 2164 2b255a0ff6c786exeexeexeex.exe 50 PID 2164 wrote to memory of 2084 2164 2b255a0ff6c786exeexeexeex.exe 50 PID 2164 wrote to memory of 2084 2164 2b255a0ff6c786exeexeexeex.exe 50 PID 2164 wrote to memory of 2676 2164 2b255a0ff6c786exeexeexeex.exe 51 PID 2164 wrote to memory of 2676 2164 2b255a0ff6c786exeexeexeex.exe 51 PID 2164 wrote to memory of 2676 2164 2b255a0ff6c786exeexeexeex.exe 51 PID 2164 wrote to memory of 2676 2164 2b255a0ff6c786exeexeexeex.exe 51 PID 2780 wrote to memory of 2608 2780 2b255a0ff6c786exeexeexeex.exe 53 PID 2780 wrote to memory of 2608 2780 2b255a0ff6c786exeexeexeex.exe 53 PID 2780 wrote to memory of 2608 2780 2b255a0ff6c786exeexeexeex.exe 53 PID 2780 wrote to memory of 2608 2780 2b255a0ff6c786exeexeexeex.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\xWUEoMEQ\mCEgwUMY.exe"C:\Users\Admin\xWUEoMEQ\mCEgwUMY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:560
-
-
C:\ProgramData\YSwsoIoI\uuoIcEUE.exe"C:\ProgramData\YSwsoIoI\uuoIcEUE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2324
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"6⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"8⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"10⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"12⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"14⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"16⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"18⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"20⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"22⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"24⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"26⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"28⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"30⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"32⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"34⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"36⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"38⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"40⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"42⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"44⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"46⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"48⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"50⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"52⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"54⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"56⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"58⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"60⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:736 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"62⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1064 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"64⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex65⤵PID:2544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"66⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex67⤵PID:1176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"68⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex69⤵PID:1644
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"70⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex71⤵PID:2148
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"72⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex73⤵PID:2164
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"74⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex75⤵PID:2660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"76⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex77⤵PID:1816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"78⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex79⤵PID:2888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"80⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex81⤵PID:2368
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"82⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex83⤵PID:3016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"84⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex85⤵PID:816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"86⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex87⤵PID:2788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"88⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex89⤵PID:1992
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"90⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex91⤵PID:2772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"92⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex93⤵PID:692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"94⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex95⤵PID:2080
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"96⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex97⤵PID:2672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"98⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex99⤵PID:1944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"100⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex101⤵PID:2920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"102⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex103⤵PID:688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"104⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex105⤵PID:1392
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"106⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex107⤵PID:2520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"108⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex109⤵PID:2428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"110⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex111⤵PID:2360
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"112⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex113⤵PID:2920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"114⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex115⤵PID:2252
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"116⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex117⤵PID:2000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"118⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex119⤵PID:2624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"120⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex121⤵PID:1096
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b255a0ff6c786exeexeexeex"122⤵PID:2640
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-