Analysis
-
max time kernel
151s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
2bb257d24f1849exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
2bb257d24f1849exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
2bb257d24f1849exeexeexeex.exe
-
Size
205KB
-
MD5
2bb257d24f18491578c3fe2799f72c64
-
SHA1
705b17b439a19358cb38af0290a6cd6322c1cfda
-
SHA256
8907cb556cc17276198121e8056348e2fd9e06d26bc37a7bc34d21193c02880b
-
SHA512
089eac8c98193b31795852ceddff62a83cf683abf021129aa55c260d73504514cfd2fd3ef28cabb8e7f09fb8d46889cd34f4f53cabd2d43cfa868326785bc79c
-
SSDEEP
6144:b1a+Wnxc7B86II733OQbhMqZsr9KDicjQ4WL:b1aVxc7B86KOfs4WL
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2872 VmkEEAkU.exe 2988 hKcAwMwY.exe -
Loads dropped DLL 20 IoCs
pid Process 3060 2bb257d24f1849exeexeexeex.exe 3060 2bb257d24f1849exeexeexeex.exe 3060 2bb257d24f1849exeexeexeex.exe 3060 2bb257d24f1849exeexeexeex.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe 2872 VmkEEAkU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Run\VmkEEAkU.exe = "C:\\Users\\Admin\\qYYQIAUM\\VmkEEAkU.exe" 2bb257d24f1849exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\hKcAwMwY.exe = "C:\\ProgramData\\OWEIsEEQ\\hKcAwMwY.exe" 2bb257d24f1849exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Run\VmkEEAkU.exe = "C:\\Users\\Admin\\qYYQIAUM\\VmkEEAkU.exe" VmkEEAkU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\hKcAwMwY.exe = "C:\\ProgramData\\OWEIsEEQ\\hKcAwMwY.exe" hKcAwMwY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2188 reg.exe 2428 reg.exe 1132 reg.exe 1996 reg.exe 1528 reg.exe 1112 reg.exe 564 reg.exe 2236 reg.exe 1076 reg.exe 2524 reg.exe 2592 reg.exe 2468 reg.exe 2404 reg.exe 2864 reg.exe 640 reg.exe 2504 reg.exe 1452 Process not Found 2556 reg.exe 1756 reg.exe 2696 reg.exe 2000 reg.exe 2928 reg.exe 1760 reg.exe 2652 reg.exe 2296 reg.exe 1984 reg.exe 2220 reg.exe 1496 reg.exe 2784 reg.exe 436 reg.exe 1944 reg.exe 1372 reg.exe 632 reg.exe 2052 reg.exe 3016 reg.exe 2508 reg.exe 2108 reg.exe 2292 reg.exe 2376 reg.exe 2720 reg.exe 580 reg.exe 2332 reg.exe 588 reg.exe 1764 reg.exe 848 reg.exe 1348 reg.exe 952 reg.exe 2124 reg.exe 1156 reg.exe 2956 reg.exe 2592 reg.exe 1920 reg.exe 1132 reg.exe 868 reg.exe 2608 reg.exe 2980 reg.exe 3044 reg.exe 2260 reg.exe 2540 reg.exe 1908 reg.exe 2104 Process not Found 2036 reg.exe 888 reg.exe 656 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3060 2bb257d24f1849exeexeexeex.exe 3060 2bb257d24f1849exeexeexeex.exe 2876 2bb257d24f1849exeexeexeex.exe 2876 2bb257d24f1849exeexeexeex.exe 1748 2bb257d24f1849exeexeexeex.exe 1748 2bb257d24f1849exeexeexeex.exe 2712 2bb257d24f1849exeexeexeex.exe 2712 2bb257d24f1849exeexeexeex.exe 2312 2bb257d24f1849exeexeexeex.exe 2312 2bb257d24f1849exeexeexeex.exe 868 2bb257d24f1849exeexeexeex.exe 868 2bb257d24f1849exeexeexeex.exe 2412 2bb257d24f1849exeexeexeex.exe 2412 2bb257d24f1849exeexeexeex.exe 2888 2bb257d24f1849exeexeexeex.exe 2888 2bb257d24f1849exeexeexeex.exe 568 2bb257d24f1849exeexeexeex.exe 568 2bb257d24f1849exeexeexeex.exe 2828 2bb257d24f1849exeexeexeex.exe 2828 2bb257d24f1849exeexeexeex.exe 972 2bb257d24f1849exeexeexeex.exe 972 2bb257d24f1849exeexeexeex.exe 2664 2bb257d24f1849exeexeexeex.exe 2664 2bb257d24f1849exeexeexeex.exe 288 2bb257d24f1849exeexeexeex.exe 288 2bb257d24f1849exeexeexeex.exe 2276 2bb257d24f1849exeexeexeex.exe 2276 2bb257d24f1849exeexeexeex.exe 1380 2bb257d24f1849exeexeexeex.exe 1380 2bb257d24f1849exeexeexeex.exe 2564 2bb257d24f1849exeexeexeex.exe 2564 2bb257d24f1849exeexeexeex.exe 768 2bb257d24f1849exeexeexeex.exe 768 2bb257d24f1849exeexeexeex.exe 904 2bb257d24f1849exeexeexeex.exe 904 2bb257d24f1849exeexeexeex.exe 772 2bb257d24f1849exeexeexeex.exe 772 2bb257d24f1849exeexeexeex.exe 1208 2bb257d24f1849exeexeexeex.exe 1208 2bb257d24f1849exeexeexeex.exe 2704 2bb257d24f1849exeexeexeex.exe 2704 2bb257d24f1849exeexeexeex.exe 1916 2bb257d24f1849exeexeexeex.exe 1916 2bb257d24f1849exeexeexeex.exe 2480 2bb257d24f1849exeexeexeex.exe 2480 2bb257d24f1849exeexeexeex.exe 2356 2bb257d24f1849exeexeexeex.exe 2356 2bb257d24f1849exeexeexeex.exe 848 2bb257d24f1849exeexeexeex.exe 848 2bb257d24f1849exeexeexeex.exe 2780 2bb257d24f1849exeexeexeex.exe 2780 2bb257d24f1849exeexeexeex.exe 1484 2bb257d24f1849exeexeexeex.exe 1484 2bb257d24f1849exeexeexeex.exe 2748 2bb257d24f1849exeexeexeex.exe 2748 2bb257d24f1849exeexeexeex.exe 1596 2bb257d24f1849exeexeexeex.exe 1596 2bb257d24f1849exeexeexeex.exe 816 2bb257d24f1849exeexeexeex.exe 816 2bb257d24f1849exeexeexeex.exe 1620 2bb257d24f1849exeexeexeex.exe 1620 2bb257d24f1849exeexeexeex.exe 2972 2bb257d24f1849exeexeexeex.exe 2972 2bb257d24f1849exeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2872 3060 2bb257d24f1849exeexeexeex.exe 27 PID 3060 wrote to memory of 2872 3060 2bb257d24f1849exeexeexeex.exe 27 PID 3060 wrote to memory of 2872 3060 2bb257d24f1849exeexeexeex.exe 27 PID 3060 wrote to memory of 2872 3060 2bb257d24f1849exeexeexeex.exe 27 PID 3060 wrote to memory of 2988 3060 2bb257d24f1849exeexeexeex.exe 28 PID 3060 wrote to memory of 2988 3060 2bb257d24f1849exeexeexeex.exe 28 PID 3060 wrote to memory of 2988 3060 2bb257d24f1849exeexeexeex.exe 28 PID 3060 wrote to memory of 2988 3060 2bb257d24f1849exeexeexeex.exe 28 PID 3060 wrote to memory of 3008 3060 2bb257d24f1849exeexeexeex.exe 29 PID 3060 wrote to memory of 3008 3060 2bb257d24f1849exeexeexeex.exe 29 PID 3060 wrote to memory of 3008 3060 2bb257d24f1849exeexeexeex.exe 29 PID 3060 wrote to memory of 3008 3060 2bb257d24f1849exeexeexeex.exe 29 PID 3008 wrote to memory of 2876 3008 cmd.exe 31 PID 3008 wrote to memory of 2876 3008 cmd.exe 31 PID 3008 wrote to memory of 2876 3008 cmd.exe 31 PID 3008 wrote to memory of 2876 3008 cmd.exe 31 PID 3060 wrote to memory of 2916 3060 2bb257d24f1849exeexeexeex.exe 32 PID 3060 wrote to memory of 2916 3060 2bb257d24f1849exeexeexeex.exe 32 PID 3060 wrote to memory of 2916 3060 2bb257d24f1849exeexeexeex.exe 32 PID 3060 wrote to memory of 2916 3060 2bb257d24f1849exeexeexeex.exe 32 PID 3060 wrote to memory of 796 3060 2bb257d24f1849exeexeexeex.exe 34 PID 3060 wrote to memory of 796 3060 2bb257d24f1849exeexeexeex.exe 34 PID 3060 wrote to memory of 796 3060 2bb257d24f1849exeexeexeex.exe 34 PID 3060 wrote to memory of 796 3060 2bb257d24f1849exeexeexeex.exe 34 PID 3060 wrote to memory of 2748 3060 2bb257d24f1849exeexeexeex.exe 36 PID 3060 wrote to memory of 2748 3060 2bb257d24f1849exeexeexeex.exe 36 PID 3060 wrote to memory of 2748 3060 2bb257d24f1849exeexeexeex.exe 36 PID 3060 wrote to memory of 2748 3060 2bb257d24f1849exeexeexeex.exe 36 PID 3060 wrote to memory of 2840 3060 2bb257d24f1849exeexeexeex.exe 38 PID 3060 wrote to memory of 2840 3060 2bb257d24f1849exeexeexeex.exe 38 PID 3060 wrote to memory of 2840 3060 2bb257d24f1849exeexeexeex.exe 38 PID 3060 wrote to memory of 2840 3060 2bb257d24f1849exeexeexeex.exe 38 PID 2876 wrote to memory of 1452 2876 2bb257d24f1849exeexeexeex.exe 41 PID 2876 wrote to memory of 1452 2876 2bb257d24f1849exeexeexeex.exe 41 PID 2876 wrote to memory of 1452 2876 2bb257d24f1849exeexeexeex.exe 41 PID 2876 wrote to memory of 1452 2876 2bb257d24f1849exeexeexeex.exe 41 PID 1452 wrote to memory of 1748 1452 cmd.exe 42 PID 1452 wrote to memory of 1748 1452 cmd.exe 42 PID 1452 wrote to memory of 1748 1452 cmd.exe 42 PID 1452 wrote to memory of 1748 1452 cmd.exe 42 PID 2840 wrote to memory of 436 2840 cmd.exe 43 PID 2840 wrote to memory of 436 2840 cmd.exe 43 PID 2840 wrote to memory of 436 2840 cmd.exe 43 PID 2840 wrote to memory of 436 2840 cmd.exe 43 PID 2876 wrote to memory of 2176 2876 2bb257d24f1849exeexeexeex.exe 44 PID 2876 wrote to memory of 2176 2876 2bb257d24f1849exeexeexeex.exe 44 PID 2876 wrote to memory of 2176 2876 2bb257d24f1849exeexeexeex.exe 44 PID 2876 wrote to memory of 2176 2876 2bb257d24f1849exeexeexeex.exe 44 PID 2876 wrote to memory of 2000 2876 2bb257d24f1849exeexeexeex.exe 47 PID 2876 wrote to memory of 2000 2876 2bb257d24f1849exeexeexeex.exe 47 PID 2876 wrote to memory of 2000 2876 2bb257d24f1849exeexeexeex.exe 47 PID 2876 wrote to memory of 2000 2876 2bb257d24f1849exeexeexeex.exe 47 PID 2876 wrote to memory of 2624 2876 2bb257d24f1849exeexeexeex.exe 45 PID 2876 wrote to memory of 2624 2876 2bb257d24f1849exeexeexeex.exe 45 PID 2876 wrote to memory of 2624 2876 2bb257d24f1849exeexeexeex.exe 45 PID 2876 wrote to memory of 2624 2876 2bb257d24f1849exeexeexeex.exe 45 PID 2876 wrote to memory of 2492 2876 2bb257d24f1849exeexeexeex.exe 49 PID 2876 wrote to memory of 2492 2876 2bb257d24f1849exeexeexeex.exe 49 PID 2876 wrote to memory of 2492 2876 2bb257d24f1849exeexeexeex.exe 49 PID 2876 wrote to memory of 2492 2876 2bb257d24f1849exeexeexeex.exe 49 PID 1748 wrote to memory of 2556 1748 2bb257d24f1849exeexeexeex.exe 52 PID 1748 wrote to memory of 2556 1748 2bb257d24f1849exeexeexeex.exe 52 PID 1748 wrote to memory of 2556 1748 2bb257d24f1849exeexeexeex.exe 52 PID 1748 wrote to memory of 2556 1748 2bb257d24f1849exeexeexeex.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\qYYQIAUM\VmkEEAkU.exe"C:\Users\Admin\qYYQIAUM\VmkEEAkU.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2872
-
-
C:\ProgramData\OWEIsEEQ\hKcAwMwY.exe"C:\ProgramData\OWEIsEEQ\hKcAwMwY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2988
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"6⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"8⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"10⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:868 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"12⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"14⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"16⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"18⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"20⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:972 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"22⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"24⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"26⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"28⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"30⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"32⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"34⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"36⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"38⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"40⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"42⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"44⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"46⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"48⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"50⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"52⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"54⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"56⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"58⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:816 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"60⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"62⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"64⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex65⤵PID:2432
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"66⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex67⤵PID:2404
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"68⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex69⤵PID:2540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"70⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex71⤵PID:1772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"72⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex73⤵PID:1580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"74⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex75⤵PID:2516
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"76⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex77⤵PID:2104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"78⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex79⤵PID:2156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"80⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex81⤵PID:2828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"82⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex83⤵PID:316
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"84⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex85⤵PID:656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"86⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex87⤵PID:2556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"88⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex89⤵PID:1528
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"90⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex91⤵PID:1304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"92⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex93⤵PID:1280
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"94⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex95⤵PID:2436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"96⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex97⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"98⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex99⤵PID:1908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"100⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex101⤵PID:2860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"102⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex103⤵PID:3048
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"104⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex105⤵PID:2568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"106⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex107⤵PID:2332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"108⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex109⤵PID:848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"110⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex111⤵PID:1964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"112⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex113⤵PID:2952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"114⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex115⤵PID:1720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"116⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex117⤵PID:2504
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"118⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex119⤵PID:2332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"120⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex121⤵PID:2916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2bb257d24f1849exeexeexeex"122⤵PID:2708
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-