Analysis
-
max time kernel
150s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
498202687dad7eexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
498202687dad7eexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
498202687dad7eexeexeexeex.exe
-
Size
328KB
-
MD5
498202687dad7e6c0c462302a302e737
-
SHA1
a969fb6d571dc6c5187f34c17bdf29ea9cb503dd
-
SHA256
8fca0dcc9c1e38ebcce835aab603535210a8a0fe54c390463c5511f1883c533d
-
SHA512
7b2be240595294d31e8b4d852bfccfd0edcb99153f161522396a2b496cc23bc741c9e245514bbc947cfa9e0521d67f0b25a0fa524393ad05354db5bfdf7ab050
-
SSDEEP
6144:YaXDq1Ydmf2KM6m8fne6xJGB8QO2Jf97+60MLB5KSFLb6HbfuNiH13/j4cbIOU:THmfu6RlyBHO2Jt+hZiibmIBr4cXU
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\CompleteRename.png.exe dyIoEcAE.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Control Panel\International\Geo\Nation dyIoEcAE.exe -
Deletes itself 1 IoCs
pid Process 3020 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2340 uigoYgME.exe 808 dyIoEcAE.exe -
Loads dropped DLL 20 IoCs
pid Process 3068 498202687dad7eexeexeexeex.exe 3068 498202687dad7eexeexeexeex.exe 3068 498202687dad7eexeexeexeex.exe 3068 498202687dad7eexeexeexeex.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Run\EEIcgYwE.exe = "C:\\Users\\Admin\\JUsQsoMc\\EEIcgYwE.exe" 498202687dad7eexeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CQAQkIwA.exe = "C:\\ProgramData\\UEoEkwsY\\CQAQkIwA.exe" 498202687dad7eexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Run\uigoYgME.exe = "C:\\Users\\Admin\\oSQkMskg\\uigoYgME.exe" 498202687dad7eexeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dyIoEcAE.exe = "C:\\ProgramData\\zQMQoQUg\\dyIoEcAE.exe" 498202687dad7eexeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dyIoEcAE.exe = "C:\\ProgramData\\zQMQoQUg\\dyIoEcAE.exe" dyIoEcAE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Run\uigoYgME.exe = "C:\\Users\\Admin\\oSQkMskg\\uigoYgME.exe" uigoYgME.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3068 2796 WerFault.exe 643 2256 2356 WerFault.exe 644 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 668 reg.exe 2264 reg.exe 2948 reg.exe 2264 reg.exe 1556 reg.exe 2536 reg.exe 2904 reg.exe 2592 reg.exe 2724 reg.exe 1368 reg.exe 1696 reg.exe 2496 reg.exe 3020 reg.exe 2448 reg.exe 2328 reg.exe 924 Process not Found 2784 reg.exe 2196 reg.exe 1456 reg.exe 848 reg.exe 2572 reg.exe 1096 reg.exe 2188 reg.exe 880 reg.exe 2904 reg.exe 2604 reg.exe 2152 reg.exe 2364 reg.exe 2756 reg.exe 1096 reg.exe 2444 reg.exe 2872 reg.exe 2284 reg.exe 1536 reg.exe 1660 reg.exe 852 reg.exe 520 Process not Found 272 reg.exe 1248 reg.exe 1096 reg.exe 2140 reg.exe 2080 reg.exe 2904 Process not Found 1872 reg.exe 868 reg.exe 680 reg.exe 2788 reg.exe 1368 reg.exe 2960 reg.exe 912 reg.exe 788 reg.exe 2260 reg.exe 1700 reg.exe 2572 reg.exe 1704 reg.exe 752 reg.exe 972 reg.exe 1380 reg.exe 2632 reg.exe 2572 reg.exe 2768 reg.exe 2824 reg.exe 2916 reg.exe 2736 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3068 498202687dad7eexeexeexeex.exe 3068 498202687dad7eexeexeexeex.exe 616 498202687dad7eexeexeexeex.exe 616 498202687dad7eexeexeexeex.exe 2564 498202687dad7eexeexeexeex.exe 2564 498202687dad7eexeexeexeex.exe 2468 498202687dad7eexeexeexeex.exe 2468 498202687dad7eexeexeexeex.exe 1168 498202687dad7eexeexeexeex.exe 1168 498202687dad7eexeexeexeex.exe 1032 498202687dad7eexeexeexeex.exe 1032 498202687dad7eexeexeexeex.exe 896 498202687dad7eexeexeexeex.exe 896 498202687dad7eexeexeexeex.exe 2232 498202687dad7eexeexeexeex.exe 2232 498202687dad7eexeexeexeex.exe 332 498202687dad7eexeexeexeex.exe 332 498202687dad7eexeexeexeex.exe 2988 498202687dad7eexeexeexeex.exe 2988 498202687dad7eexeexeexeex.exe 2448 498202687dad7eexeexeexeex.exe 2448 498202687dad7eexeexeexeex.exe 300 498202687dad7eexeexeexeex.exe 300 498202687dad7eexeexeexeex.exe 2276 498202687dad7eexeexeexeex.exe 2276 498202687dad7eexeexeexeex.exe 520 498202687dad7eexeexeexeex.exe 520 498202687dad7eexeexeexeex.exe 2560 498202687dad7eexeexeexeex.exe 2560 498202687dad7eexeexeexeex.exe 1788 498202687dad7eexeexeexeex.exe 1788 498202687dad7eexeexeexeex.exe 1764 498202687dad7eexeexeexeex.exe 1764 498202687dad7eexeexeexeex.exe 2116 498202687dad7eexeexeexeex.exe 2116 498202687dad7eexeexeexeex.exe 2996 498202687dad7eexeexeexeex.exe 2996 498202687dad7eexeexeexeex.exe 2980 498202687dad7eexeexeexeex.exe 2980 498202687dad7eexeexeexeex.exe 2508 498202687dad7eexeexeexeex.exe 2508 498202687dad7eexeexeexeex.exe 2504 498202687dad7eexeexeexeex.exe 2504 498202687dad7eexeexeexeex.exe 1772 498202687dad7eexeexeexeex.exe 1772 498202687dad7eexeexeexeex.exe 1808 498202687dad7eexeexeexeex.exe 1808 498202687dad7eexeexeexeex.exe 1660 498202687dad7eexeexeexeex.exe 1660 498202687dad7eexeexeexeex.exe 296 498202687dad7eexeexeexeex.exe 296 498202687dad7eexeexeexeex.exe 2620 498202687dad7eexeexeexeex.exe 2620 498202687dad7eexeexeexeex.exe 2928 498202687dad7eexeexeexeex.exe 2928 498202687dad7eexeexeexeex.exe 2776 498202687dad7eexeexeexeex.exe 2776 498202687dad7eexeexeexeex.exe 1604 498202687dad7eexeexeexeex.exe 1604 498202687dad7eexeexeexeex.exe 2456 498202687dad7eexeexeexeex.exe 2456 498202687dad7eexeexeexeex.exe 2924 498202687dad7eexeexeexeex.exe 2924 498202687dad7eexeexeexeex.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe 808 dyIoEcAE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2340 3068 498202687dad7eexeexeexeex.exe 29 PID 3068 wrote to memory of 2340 3068 498202687dad7eexeexeexeex.exe 29 PID 3068 wrote to memory of 2340 3068 498202687dad7eexeexeexeex.exe 29 PID 3068 wrote to memory of 2340 3068 498202687dad7eexeexeexeex.exe 29 PID 3068 wrote to memory of 808 3068 498202687dad7eexeexeexeex.exe 30 PID 3068 wrote to memory of 808 3068 498202687dad7eexeexeexeex.exe 30 PID 3068 wrote to memory of 808 3068 498202687dad7eexeexeexeex.exe 30 PID 3068 wrote to memory of 808 3068 498202687dad7eexeexeexeex.exe 30 PID 3068 wrote to memory of 2120 3068 498202687dad7eexeexeexeex.exe 32 PID 3068 wrote to memory of 2120 3068 498202687dad7eexeexeexeex.exe 32 PID 3068 wrote to memory of 2120 3068 498202687dad7eexeexeexeex.exe 32 PID 3068 wrote to memory of 2120 3068 498202687dad7eexeexeexeex.exe 32 PID 2120 wrote to memory of 616 2120 cmd.exe 33 PID 2120 wrote to memory of 616 2120 cmd.exe 33 PID 2120 wrote to memory of 616 2120 cmd.exe 33 PID 2120 wrote to memory of 616 2120 cmd.exe 33 PID 3068 wrote to memory of 272 3068 498202687dad7eexeexeexeex.exe 34 PID 3068 wrote to memory of 272 3068 498202687dad7eexeexeexeex.exe 34 PID 3068 wrote to memory of 272 3068 498202687dad7eexeexeexeex.exe 34 PID 3068 wrote to memory of 272 3068 498202687dad7eexeexeexeex.exe 34 PID 3068 wrote to memory of 2080 3068 498202687dad7eexeexeexeex.exe 35 PID 3068 wrote to memory of 2080 3068 498202687dad7eexeexeexeex.exe 35 PID 3068 wrote to memory of 2080 3068 498202687dad7eexeexeexeex.exe 35 PID 3068 wrote to memory of 2080 3068 498202687dad7eexeexeexeex.exe 35 PID 3068 wrote to memory of 2240 3068 498202687dad7eexeexeexeex.exe 38 PID 3068 wrote to memory of 2240 3068 498202687dad7eexeexeexeex.exe 38 PID 3068 wrote to memory of 2240 3068 498202687dad7eexeexeexeex.exe 38 PID 3068 wrote to memory of 2240 3068 498202687dad7eexeexeexeex.exe 38 PID 3068 wrote to memory of 2872 3068 498202687dad7eexeexeexeex.exe 40 PID 3068 wrote to memory of 2872 3068 498202687dad7eexeexeexeex.exe 40 PID 3068 wrote to memory of 2872 3068 498202687dad7eexeexeexeex.exe 40 PID 3068 wrote to memory of 2872 3068 498202687dad7eexeexeexeex.exe 40 PID 2872 wrote to memory of 2812 2872 cmd.exe 42 PID 2872 wrote to memory of 2812 2872 cmd.exe 42 PID 2872 wrote to memory of 2812 2872 cmd.exe 42 PID 2872 wrote to memory of 2812 2872 cmd.exe 42 PID 616 wrote to memory of 2200 616 498202687dad7eexeexeexeex.exe 43 PID 616 wrote to memory of 2200 616 498202687dad7eexeexeexeex.exe 43 PID 616 wrote to memory of 2200 616 498202687dad7eexeexeexeex.exe 43 PID 616 wrote to memory of 2200 616 498202687dad7eexeexeexeex.exe 43 PID 2200 wrote to memory of 2564 2200 cmd.exe 45 PID 2200 wrote to memory of 2564 2200 cmd.exe 45 PID 2200 wrote to memory of 2564 2200 cmd.exe 45 PID 2200 wrote to memory of 2564 2200 cmd.exe 45 PID 616 wrote to memory of 2724 616 498202687dad7eexeexeexeex.exe 46 PID 616 wrote to memory of 2724 616 498202687dad7eexeexeexeex.exe 46 PID 616 wrote to memory of 2724 616 498202687dad7eexeexeexeex.exe 46 PID 616 wrote to memory of 2724 616 498202687dad7eexeexeexeex.exe 46 PID 616 wrote to memory of 2736 616 498202687dad7eexeexeexeex.exe 47 PID 616 wrote to memory of 2736 616 498202687dad7eexeexeexeex.exe 47 PID 616 wrote to memory of 2736 616 498202687dad7eexeexeexeex.exe 47 PID 616 wrote to memory of 2736 616 498202687dad7eexeexeexeex.exe 47 PID 616 wrote to memory of 2764 616 498202687dad7eexeexeexeex.exe 51 PID 616 wrote to memory of 2764 616 498202687dad7eexeexeexeex.exe 51 PID 616 wrote to memory of 2764 616 498202687dad7eexeexeexeex.exe 51 PID 616 wrote to memory of 2764 616 498202687dad7eexeexeexeex.exe 51 PID 616 wrote to memory of 2732 616 498202687dad7eexeexeexeex.exe 49 PID 616 wrote to memory of 2732 616 498202687dad7eexeexeexeex.exe 49 PID 616 wrote to memory of 2732 616 498202687dad7eexeexeexeex.exe 49 PID 616 wrote to memory of 2732 616 498202687dad7eexeexeexeex.exe 49 PID 2732 wrote to memory of 2640 2732 cmd.exe 54 PID 2732 wrote to memory of 2640 2732 cmd.exe 54 PID 2732 wrote to memory of 2640 2732 cmd.exe 54 PID 2732 wrote to memory of 2640 2732 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\oSQkMskg\uigoYgME.exe"C:\Users\Admin\oSQkMskg\uigoYgME.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2340
-
-
C:\ProgramData\zQMQoQUg\dyIoEcAE.exe"C:\ProgramData\zQMQoQUg\dyIoEcAE.exe"2⤵
- Modifies extensions of user files
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:808
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"6⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"8⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"10⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"12⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"14⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"16⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"18⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"20⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"22⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"24⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"26⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:520 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"28⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"30⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"32⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"34⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"36⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"38⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"40⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"42⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"44⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"46⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"48⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"50⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"52⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"54⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"56⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"58⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"60⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"62⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"64⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex65⤵PID:816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"66⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex67⤵PID:1084
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"68⤵PID:300
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex69⤵PID:1576
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"70⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex71⤵PID:1620
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"72⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex73⤵PID:1160
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"74⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex75⤵PID:1672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"76⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex77⤵PID:2044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"78⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex79⤵PID:556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"80⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex81⤵PID:2960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"82⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex83⤵PID:2240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"84⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex85⤵PID:884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"86⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex87⤵PID:1544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"88⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex89⤵PID:2748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"90⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex91⤵PID:556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"92⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex93⤵PID:908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"94⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex95⤵PID:2220
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"96⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex97⤵PID:2972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"98⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex99⤵PID:2736
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"100⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex101⤵PID:2520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"102⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex103⤵
- Adds Run key to start application
PID:2272 -
C:\Users\Admin\JUsQsoMc\EEIcgYwE.exe"C:\Users\Admin\JUsQsoMc\EEIcgYwE.exe"104⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 36105⤵
- Program crash
PID:3068
-
-
-
C:\ProgramData\UEoEkwsY\CQAQkIwA.exe"C:\ProgramData\UEoEkwsY\CQAQkIwA.exe"104⤵PID:2356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 36105⤵
- Program crash
PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"104⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex105⤵PID:2148
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"106⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex107⤵PID:648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"108⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex109⤵PID:2664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"110⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex111⤵PID:2352
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"112⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex113⤵PID:1636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"114⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex115⤵PID:2492
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"116⤵PID:300
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex117⤵PID:2612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"118⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex119⤵PID:2840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"120⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex121⤵PID:2736
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\498202687dad7eexeexeexeex"122⤵PID:2348
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-