Analysis
-
max time kernel
150s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
736637038866caexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
736637038866caexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
736637038866caexeexeexeex.exe
-
Size
212KB
-
MD5
736637038866cade6176dfa64332b73a
-
SHA1
fca783f5055486b8f92b4cf66a8825309cfdbc54
-
SHA256
09b8922ccb5c0f8aa4fc12e03ac7bab73fadedef214987f8fbc71e45887844b3
-
SHA512
81cac13d4844595cfae543f2185c7b2611afa530769f7cd0b9f997f90c9242abc7b1b5879787d6b26104f039c62a4e41aebb611ae20aefc958e769aa812ec2ec
-
SSDEEP
3072:UUIBXivmr2KzZUiRjKqXy2qQsgyTt+kCOScPGjCiyNzKIn:U5JivauitqxfLuyNzKI
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\SetAdd.png.exe oOIscQUY.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Control Panel\International\Geo\Nation oOIscQUY.exe -
Deletes itself 1 IoCs
pid Process 2176 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2328 TKskIwgQ.exe 2996 oOIscQUY.exe -
Loads dropped DLL 20 IoCs
pid Process 2228 736637038866caexeexeexeex.exe 2228 736637038866caexeexeexeex.exe 2228 736637038866caexeexeexeex.exe 2228 736637038866caexeexeexeex.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oOIscQUY.exe = "C:\\ProgramData\\VyEYkYIs\\oOIscQUY.exe" 736637038866caexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Run\TKskIwgQ.exe = "C:\\Users\\Admin\\CuUIwsYc\\TKskIwgQ.exe" TKskIwgQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oOIscQUY.exe = "C:\\ProgramData\\VyEYkYIs\\oOIscQUY.exe" oOIscQUY.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Run\TKskIwgQ.exe = "C:\\Users\\Admin\\CuUIwsYc\\TKskIwgQ.exe" 736637038866caexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 3024 Process not Found 2396 reg.exe 3052 reg.exe 2376 reg.exe 2860 reg.exe 1016 reg.exe 2696 reg.exe 1816 reg.exe 2712 reg.exe 2268 reg.exe 2360 reg.exe 1576 reg.exe 1500 reg.exe 1564 reg.exe 1984 reg.exe 1888 reg.exe 756 reg.exe 1312 reg.exe 836 reg.exe 2540 reg.exe 2204 reg.exe 776 reg.exe 2796 reg.exe 2764 Process not Found 2312 reg.exe 3044 reg.exe 2108 reg.exe 2808 reg.exe 1076 reg.exe 272 reg.exe 1724 reg.exe 2624 reg.exe 1768 reg.exe 2360 reg.exe 1956 reg.exe 2772 reg.exe 1780 reg.exe 2412 reg.exe 2664 reg.exe 2576 reg.exe 636 reg.exe 2420 reg.exe 2080 reg.exe 2892 reg.exe 608 reg.exe 2808 reg.exe 1068 reg.exe 848 reg.exe 2536 reg.exe 932 reg.exe 1808 reg.exe 1756 reg.exe 1576 reg.exe 2684 reg.exe 2928 reg.exe 2760 reg.exe 2372 reg.exe 640 Process not Found 2492 reg.exe 2676 reg.exe 532 reg.exe 3068 reg.exe 2348 reg.exe 1320 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2228 736637038866caexeexeexeex.exe 2228 736637038866caexeexeexeex.exe 396 736637038866caexeexeexeex.exe 396 736637038866caexeexeexeex.exe 2972 736637038866caexeexeexeex.exe 2972 736637038866caexeexeexeex.exe 3036 736637038866caexeexeexeex.exe 3036 736637038866caexeexeexeex.exe 1724 736637038866caexeexeexeex.exe 1724 736637038866caexeexeexeex.exe 2864 736637038866caexeexeexeex.exe 2864 736637038866caexeexeexeex.exe 2404 736637038866caexeexeexeex.exe 2404 736637038866caexeexeexeex.exe 2284 736637038866caexeexeexeex.exe 2284 736637038866caexeexeexeex.exe 2688 736637038866caexeexeexeex.exe 2688 736637038866caexeexeexeex.exe 1984 736637038866caexeexeexeex.exe 1984 736637038866caexeexeexeex.exe 2880 736637038866caexeexeexeex.exe 2880 736637038866caexeexeexeex.exe 1348 736637038866caexeexeexeex.exe 1348 736637038866caexeexeexeex.exe 1988 736637038866caexeexeexeex.exe 1988 736637038866caexeexeexeex.exe 1860 736637038866caexeexeexeex.exe 1860 736637038866caexeexeexeex.exe 2508 736637038866caexeexeexeex.exe 2508 736637038866caexeexeexeex.exe 396 736637038866caexeexeexeex.exe 396 736637038866caexeexeexeex.exe 2108 736637038866caexeexeexeex.exe 2108 736637038866caexeexeexeex.exe 1332 736637038866caexeexeexeex.exe 1332 736637038866caexeexeexeex.exe 2256 736637038866caexeexeexeex.exe 2256 736637038866caexeexeexeex.exe 2184 736637038866caexeexeexeex.exe 2184 736637038866caexeexeexeex.exe 2552 736637038866caexeexeexeex.exe 2552 736637038866caexeexeexeex.exe 2512 736637038866caexeexeexeex.exe 2512 736637038866caexeexeexeex.exe 1604 736637038866caexeexeexeex.exe 1604 736637038866caexeexeexeex.exe 1876 736637038866caexeexeexeex.exe 1876 736637038866caexeexeexeex.exe 2356 736637038866caexeexeexeex.exe 2356 736637038866caexeexeexeex.exe 2264 736637038866caexeexeexeex.exe 2264 736637038866caexeexeexeex.exe 1288 736637038866caexeexeexeex.exe 1288 736637038866caexeexeexeex.exe 2220 736637038866caexeexeexeex.exe 2220 736637038866caexeexeexeex.exe 2464 736637038866caexeexeexeex.exe 2464 736637038866caexeexeexeex.exe 3044 736637038866caexeexeexeex.exe 3044 736637038866caexeexeexeex.exe 2768 736637038866caexeexeexeex.exe 2768 736637038866caexeexeexeex.exe 2820 736637038866caexeexeexeex.exe 2820 736637038866caexeexeexeex.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe 2996 oOIscQUY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2328 2228 736637038866caexeexeexeex.exe 29 PID 2228 wrote to memory of 2328 2228 736637038866caexeexeexeex.exe 29 PID 2228 wrote to memory of 2328 2228 736637038866caexeexeexeex.exe 29 PID 2228 wrote to memory of 2328 2228 736637038866caexeexeexeex.exe 29 PID 2228 wrote to memory of 2996 2228 736637038866caexeexeexeex.exe 30 PID 2228 wrote to memory of 2996 2228 736637038866caexeexeexeex.exe 30 PID 2228 wrote to memory of 2996 2228 736637038866caexeexeexeex.exe 30 PID 2228 wrote to memory of 2996 2228 736637038866caexeexeexeex.exe 30 PID 2228 wrote to memory of 1044 2228 736637038866caexeexeexeex.exe 31 PID 2228 wrote to memory of 1044 2228 736637038866caexeexeexeex.exe 31 PID 2228 wrote to memory of 1044 2228 736637038866caexeexeexeex.exe 31 PID 2228 wrote to memory of 1044 2228 736637038866caexeexeexeex.exe 31 PID 1044 wrote to memory of 396 1044 cmd.exe 33 PID 1044 wrote to memory of 396 1044 cmd.exe 33 PID 1044 wrote to memory of 396 1044 cmd.exe 33 PID 1044 wrote to memory of 396 1044 cmd.exe 33 PID 2228 wrote to memory of 2312 2228 736637038866caexeexeexeex.exe 34 PID 2228 wrote to memory of 2312 2228 736637038866caexeexeexeex.exe 34 PID 2228 wrote to memory of 2312 2228 736637038866caexeexeexeex.exe 34 PID 2228 wrote to memory of 2312 2228 736637038866caexeexeexeex.exe 34 PID 2228 wrote to memory of 1576 2228 736637038866caexeexeexeex.exe 35 PID 2228 wrote to memory of 1576 2228 736637038866caexeexeexeex.exe 35 PID 2228 wrote to memory of 1576 2228 736637038866caexeexeexeex.exe 35 PID 2228 wrote to memory of 1576 2228 736637038866caexeexeexeex.exe 35 PID 2228 wrote to memory of 2144 2228 736637038866caexeexeexeex.exe 36 PID 2228 wrote to memory of 2144 2228 736637038866caexeexeexeex.exe 36 PID 2228 wrote to memory of 2144 2228 736637038866caexeexeexeex.exe 36 PID 2228 wrote to memory of 2144 2228 736637038866caexeexeexeex.exe 36 PID 2228 wrote to memory of 1556 2228 736637038866caexeexeexeex.exe 37 PID 2228 wrote to memory of 1556 2228 736637038866caexeexeexeex.exe 37 PID 2228 wrote to memory of 1556 2228 736637038866caexeexeexeex.exe 37 PID 2228 wrote to memory of 1556 2228 736637038866caexeexeexeex.exe 37 PID 1556 wrote to memory of 2944 1556 cmd.exe 42 PID 1556 wrote to memory of 2944 1556 cmd.exe 42 PID 1556 wrote to memory of 2944 1556 cmd.exe 42 PID 1556 wrote to memory of 2944 1556 cmd.exe 42 PID 396 wrote to memory of 2748 396 736637038866caexeexeexeex.exe 43 PID 396 wrote to memory of 2748 396 736637038866caexeexeexeex.exe 43 PID 396 wrote to memory of 2748 396 736637038866caexeexeexeex.exe 43 PID 396 wrote to memory of 2748 396 736637038866caexeexeexeex.exe 43 PID 2748 wrote to memory of 2972 2748 cmd.exe 45 PID 2748 wrote to memory of 2972 2748 cmd.exe 45 PID 2748 wrote to memory of 2972 2748 cmd.exe 45 PID 2748 wrote to memory of 2972 2748 cmd.exe 45 PID 396 wrote to memory of 2652 396 736637038866caexeexeexeex.exe 46 PID 396 wrote to memory of 2652 396 736637038866caexeexeexeex.exe 46 PID 396 wrote to memory of 2652 396 736637038866caexeexeexeex.exe 46 PID 396 wrote to memory of 2652 396 736637038866caexeexeexeex.exe 46 PID 396 wrote to memory of 2612 396 736637038866caexeexeexeex.exe 47 PID 396 wrote to memory of 2612 396 736637038866caexeexeexeex.exe 47 PID 396 wrote to memory of 2612 396 736637038866caexeexeexeex.exe 47 PID 396 wrote to memory of 2612 396 736637038866caexeexeexeex.exe 47 PID 396 wrote to memory of 2640 396 736637038866caexeexeexeex.exe 49 PID 396 wrote to memory of 2640 396 736637038866caexeexeexeex.exe 49 PID 396 wrote to memory of 2640 396 736637038866caexeexeexeex.exe 49 PID 396 wrote to memory of 2640 396 736637038866caexeexeexeex.exe 49 PID 396 wrote to memory of 2716 396 736637038866caexeexeexeex.exe 50 PID 396 wrote to memory of 2716 396 736637038866caexeexeexeex.exe 50 PID 396 wrote to memory of 2716 396 736637038866caexeexeexeex.exe 50 PID 396 wrote to memory of 2716 396 736637038866caexeexeexeex.exe 50 PID 2716 wrote to memory of 2700 2716 cmd.exe 54 PID 2716 wrote to memory of 2700 2716 cmd.exe 54 PID 2716 wrote to memory of 2700 2716 cmd.exe 54 PID 2716 wrote to memory of 2700 2716 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\CuUIwsYc\TKskIwgQ.exe"C:\Users\Admin\CuUIwsYc\TKskIwgQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2328
-
-
C:\ProgramData\VyEYkYIs\oOIscQUY.exe"C:\ProgramData\VyEYkYIs\oOIscQUY.exe"2⤵
- Modifies extensions of user files
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:2996
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"6⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"8⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"10⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"12⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"14⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"16⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"18⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"20⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"22⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"24⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"26⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"28⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"30⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"32⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"34⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"36⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"38⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"40⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"42⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"44⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"46⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"48⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"50⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"52⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"54⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"56⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"58⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"60⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"62⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"64⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex65⤵PID:1564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"66⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex67⤵PID:2360
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"68⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex69⤵PID:2788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"70⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex71⤵PID:2676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"72⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex73⤵PID:1316
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"74⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex75⤵PID:2612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"76⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex77⤵PID:2420
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"78⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex79⤵PID:3040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"80⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex81⤵PID:636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"82⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex83⤵PID:1760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"84⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex85⤵PID:2332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"86⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex87⤵PID:2432
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"88⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex89⤵PID:2672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"90⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex91⤵PID:2288
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"92⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex93⤵PID:1252
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"94⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex95⤵PID:2372
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"96⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex97⤵PID:1632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"98⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex99⤵PID:1484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"100⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex101⤵PID:1608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"102⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex103⤵PID:2684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"104⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex105⤵PID:2912
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"106⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex107⤵PID:2352
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"108⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex109⤵PID:2568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"110⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex111⤵PID:2852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"112⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex113⤵PID:1212
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"114⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex115⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"116⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex117⤵PID:2560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"118⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex119⤵PID:1076
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"120⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex121⤵PID:300
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\736637038866caexeexeexeex"122⤵PID:2040
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-