Analysis
-
max time kernel
150s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08-07-2023 18:04
Static task
static1
Behavioral task
behavioral1
Sample
72fa596bea9904exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
72fa596bea9904exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
72fa596bea9904exeexeexeex.exe
-
Size
196KB
-
MD5
72fa596bea99044869b1fb4837edd93f
-
SHA1
f3d93b71db69ed0c6cc4c16a502a5a724f9f9ea6
-
SHA256
50710a837e7e04b0ca0672729a2d18aca8f2820e9f16071ac43f604fdb2c9308
-
SHA512
d7237f31458e5c66cbfabc77d9858c53578028ef30e63aca1c1de08f1ed55fc7673bde861188dea80dccc42c060df522b15ba5a8bbd0a7e963ec6b299b82bcf2
-
SSDEEP
3072:o24UhzMGVrQN3m9vxC4/zgDXRMRPcStGonSj+o/LCES/sK9cJvuXoOf:oBUK8QNeCczyRMxntGonSaIytyw4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\ConfirmMove.png.exe qeYMEcMY.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Control Panel\International\Geo\Nation qeYMEcMY.exe -
Deletes itself 1 IoCs
pid Process 2896 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2184 bUAQcQQc.exe 3020 qeYMEcMY.exe -
Loads dropped DLL 20 IoCs
pid Process 2320 72fa596bea9904exeexeexeex.exe 2320 72fa596bea9904exeexeexeex.exe 2320 72fa596bea9904exeexeexeex.exe 2320 72fa596bea9904exeexeexeex.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Run\bUAQcQQc.exe = "C:\\Users\\Admin\\DCgsUYAA\\bUAQcQQc.exe" 72fa596bea9904exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qeYMEcMY.exe = "C:\\ProgramData\\QmMAIEkU\\qeYMEcMY.exe" 72fa596bea9904exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qeYMEcMY.exe = "C:\\ProgramData\\QmMAIEkU\\qeYMEcMY.exe" qeYMEcMY.exe Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Run\bUAQcQQc.exe = "C:\\Users\\Admin\\DCgsUYAA\\bUAQcQQc.exe" bUAQcQQc.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 72fa596bea9904exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 72fa596bea9904exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 3060 reg.exe 1692 reg.exe 1720 reg.exe 2548 reg.exe 308 reg.exe 2268 reg.exe 1160 reg.exe 2436 reg.exe 712 reg.exe 2568 reg.exe 1728 reg.exe 2772 reg.exe 296 reg.exe 3060 reg.exe 2192 reg.exe 2248 reg.exe 2204 reg.exe 1344 reg.exe 3024 reg.exe 1628 reg.exe 2704 Process not Found 2104 reg.exe 2712 Process not Found 1424 reg.exe 2276 reg.exe 1668 reg.exe 1120 reg.exe 2852 reg.exe 1488 reg.exe 2176 Process not Found 2760 Process not Found 1556 reg.exe 2824 reg.exe 864 reg.exe 2380 reg.exe 640 reg.exe 2052 reg.exe 1920 reg.exe 1524 reg.exe 2792 Process not Found 1308 reg.exe 268 reg.exe 2788 reg.exe 2640 reg.exe 1508 reg.exe 2836 reg.exe 2688 Process not Found 2912 reg.exe 1236 reg.exe 2960 reg.exe 1928 reg.exe 2356 reg.exe 2624 reg.exe 2852 reg.exe 524 Process not Found 2884 reg.exe 2376 reg.exe 2384 reg.exe 2672 reg.exe 2908 reg.exe 1468 reg.exe 2620 Process not Found 2396 Process not Found 1036 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2320 72fa596bea9904exeexeexeex.exe 2320 72fa596bea9904exeexeexeex.exe 2224 72fa596bea9904exeexeexeex.exe 2224 72fa596bea9904exeexeexeex.exe 2892 72fa596bea9904exeexeexeex.exe 2892 72fa596bea9904exeexeexeex.exe 1280 72fa596bea9904exeexeexeex.exe 1280 72fa596bea9904exeexeexeex.exe 1028 72fa596bea9904exeexeexeex.exe 1028 72fa596bea9904exeexeexeex.exe 2016 72fa596bea9904exeexeexeex.exe 2016 72fa596bea9904exeexeexeex.exe 952 72fa596bea9904exeexeexeex.exe 952 72fa596bea9904exeexeexeex.exe 884 72fa596bea9904exeexeexeex.exe 884 72fa596bea9904exeexeexeex.exe 2012 72fa596bea9904exeexeexeex.exe 2012 72fa596bea9904exeexeexeex.exe 3036 72fa596bea9904exeexeexeex.exe 3036 72fa596bea9904exeexeexeex.exe 1800 72fa596bea9904exeexeexeex.exe 1800 72fa596bea9904exeexeexeex.exe 2924 72fa596bea9904exeexeexeex.exe 2924 72fa596bea9904exeexeexeex.exe 1944 72fa596bea9904exeexeexeex.exe 1944 72fa596bea9904exeexeexeex.exe 1548 72fa596bea9904exeexeexeex.exe 1548 72fa596bea9904exeexeexeex.exe 1644 72fa596bea9904exeexeexeex.exe 1644 72fa596bea9904exeexeexeex.exe 2852 72fa596bea9904exeexeexeex.exe 2852 72fa596bea9904exeexeexeex.exe 2936 72fa596bea9904exeexeexeex.exe 2936 72fa596bea9904exeexeexeex.exe 1800 72fa596bea9904exeexeexeex.exe 1800 72fa596bea9904exeexeexeex.exe 2400 72fa596bea9904exeexeexeex.exe 2400 72fa596bea9904exeexeexeex.exe 2324 72fa596bea9904exeexeexeex.exe 2324 72fa596bea9904exeexeexeex.exe 2540 72fa596bea9904exeexeexeex.exe 2540 72fa596bea9904exeexeexeex.exe 2888 72fa596bea9904exeexeexeex.exe 2888 72fa596bea9904exeexeexeex.exe 2464 72fa596bea9904exeexeexeex.exe 2464 72fa596bea9904exeexeexeex.exe 1392 72fa596bea9904exeexeexeex.exe 1392 72fa596bea9904exeexeexeex.exe 2424 72fa596bea9904exeexeexeex.exe 2424 72fa596bea9904exeexeexeex.exe 2364 72fa596bea9904exeexeexeex.exe 2364 72fa596bea9904exeexeexeex.exe 2228 72fa596bea9904exeexeexeex.exe 2228 72fa596bea9904exeexeexeex.exe 864 72fa596bea9904exeexeexeex.exe 864 72fa596bea9904exeexeexeex.exe 2284 72fa596bea9904exeexeexeex.exe 2284 72fa596bea9904exeexeexeex.exe 1184 72fa596bea9904exeexeexeex.exe 1184 72fa596bea9904exeexeexeex.exe 2252 72fa596bea9904exeexeexeex.exe 2252 72fa596bea9904exeexeexeex.exe 2400 72fa596bea9904exeexeexeex.exe 2400 72fa596bea9904exeexeexeex.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3020 qeYMEcMY.exe 3020 qeYMEcMY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2184 2320 72fa596bea9904exeexeexeex.exe 28 PID 2320 wrote to memory of 2184 2320 72fa596bea9904exeexeexeex.exe 28 PID 2320 wrote to memory of 2184 2320 72fa596bea9904exeexeexeex.exe 28 PID 2320 wrote to memory of 2184 2320 72fa596bea9904exeexeexeex.exe 28 PID 2320 wrote to memory of 3020 2320 72fa596bea9904exeexeexeex.exe 29 PID 2320 wrote to memory of 3020 2320 72fa596bea9904exeexeexeex.exe 29 PID 2320 wrote to memory of 3020 2320 72fa596bea9904exeexeexeex.exe 29 PID 2320 wrote to memory of 3020 2320 72fa596bea9904exeexeexeex.exe 29 PID 2320 wrote to memory of 2944 2320 72fa596bea9904exeexeexeex.exe 30 PID 2320 wrote to memory of 2944 2320 72fa596bea9904exeexeexeex.exe 30 PID 2320 wrote to memory of 2944 2320 72fa596bea9904exeexeexeex.exe 30 PID 2320 wrote to memory of 2944 2320 72fa596bea9904exeexeexeex.exe 30 PID 2944 wrote to memory of 2224 2944 cmd.exe 32 PID 2944 wrote to memory of 2224 2944 cmd.exe 32 PID 2944 wrote to memory of 2224 2944 cmd.exe 32 PID 2944 wrote to memory of 2224 2944 cmd.exe 32 PID 2320 wrote to memory of 1540 2320 72fa596bea9904exeexeexeex.exe 33 PID 2320 wrote to memory of 1540 2320 72fa596bea9904exeexeexeex.exe 33 PID 2320 wrote to memory of 1540 2320 72fa596bea9904exeexeexeex.exe 33 PID 2320 wrote to memory of 1540 2320 72fa596bea9904exeexeexeex.exe 33 PID 2320 wrote to memory of 1992 2320 72fa596bea9904exeexeexeex.exe 34 PID 2320 wrote to memory of 1992 2320 72fa596bea9904exeexeexeex.exe 34 PID 2320 wrote to memory of 1992 2320 72fa596bea9904exeexeexeex.exe 34 PID 2320 wrote to memory of 1992 2320 72fa596bea9904exeexeexeex.exe 34 PID 2320 wrote to memory of 2428 2320 72fa596bea9904exeexeexeex.exe 36 PID 2320 wrote to memory of 2428 2320 72fa596bea9904exeexeexeex.exe 36 PID 2320 wrote to memory of 2428 2320 72fa596bea9904exeexeexeex.exe 36 PID 2320 wrote to memory of 2428 2320 72fa596bea9904exeexeexeex.exe 36 PID 2320 wrote to memory of 2128 2320 72fa596bea9904exeexeexeex.exe 38 PID 2320 wrote to memory of 2128 2320 72fa596bea9904exeexeexeex.exe 38 PID 2320 wrote to memory of 2128 2320 72fa596bea9904exeexeexeex.exe 38 PID 2320 wrote to memory of 2128 2320 72fa596bea9904exeexeexeex.exe 38 PID 2128 wrote to memory of 2028 2128 cmd.exe 41 PID 2128 wrote to memory of 2028 2128 cmd.exe 41 PID 2128 wrote to memory of 2028 2128 cmd.exe 41 PID 2128 wrote to memory of 2028 2128 cmd.exe 41 PID 2224 wrote to memory of 2788 2224 72fa596bea9904exeexeexeex.exe 42 PID 2224 wrote to memory of 2788 2224 72fa596bea9904exeexeexeex.exe 42 PID 2224 wrote to memory of 2788 2224 72fa596bea9904exeexeexeex.exe 42 PID 2224 wrote to memory of 2788 2224 72fa596bea9904exeexeexeex.exe 42 PID 2788 wrote to memory of 2892 2788 cmd.exe 44 PID 2788 wrote to memory of 2892 2788 cmd.exe 44 PID 2788 wrote to memory of 2892 2788 cmd.exe 44 PID 2788 wrote to memory of 2892 2788 cmd.exe 44 PID 2224 wrote to memory of 2956 2224 72fa596bea9904exeexeexeex.exe 45 PID 2224 wrote to memory of 2956 2224 72fa596bea9904exeexeexeex.exe 45 PID 2224 wrote to memory of 2956 2224 72fa596bea9904exeexeexeex.exe 45 PID 2224 wrote to memory of 2956 2224 72fa596bea9904exeexeexeex.exe 45 PID 2224 wrote to memory of 2600 2224 72fa596bea9904exeexeexeex.exe 46 PID 2224 wrote to memory of 2600 2224 72fa596bea9904exeexeexeex.exe 46 PID 2224 wrote to memory of 2600 2224 72fa596bea9904exeexeexeex.exe 46 PID 2224 wrote to memory of 2600 2224 72fa596bea9904exeexeexeex.exe 46 PID 2224 wrote to memory of 944 2224 72fa596bea9904exeexeexeex.exe 48 PID 2224 wrote to memory of 944 2224 72fa596bea9904exeexeexeex.exe 48 PID 2224 wrote to memory of 944 2224 72fa596bea9904exeexeexeex.exe 48 PID 2224 wrote to memory of 944 2224 72fa596bea9904exeexeexeex.exe 48 PID 2224 wrote to memory of 2532 2224 72fa596bea9904exeexeexeex.exe 52 PID 2224 wrote to memory of 2532 2224 72fa596bea9904exeexeexeex.exe 52 PID 2224 wrote to memory of 2532 2224 72fa596bea9904exeexeexeex.exe 52 PID 2224 wrote to memory of 2532 2224 72fa596bea9904exeexeexeex.exe 52 PID 2532 wrote to memory of 2884 2532 cmd.exe 53 PID 2532 wrote to memory of 2884 2532 cmd.exe 53 PID 2532 wrote to memory of 2884 2532 cmd.exe 53 PID 2532 wrote to memory of 2884 2532 cmd.exe 53 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 72fa596bea9904exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 72fa596bea9904exeexeexeex.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\DCgsUYAA\bUAQcQQc.exe"C:\Users\Admin\DCgsUYAA\bUAQcQQc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2184
-
-
C:\ProgramData\QmMAIEkU\qeYMEcMY.exe"C:\ProgramData\QmMAIEkU\qeYMEcMY.exe"2⤵
- Modifies extensions of user files
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:3020
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"6⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"8⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"10⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"12⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"14⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"16⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"18⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"20⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"22⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"24⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"26⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"28⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"30⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"32⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"34⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"36⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"38⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"40⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"42⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"44⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"46⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"48⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"50⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"52⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"54⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"56⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"58⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"60⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"62⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"64⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex65⤵PID:1732
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"66⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex67⤵PID:2480
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"68⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex69⤵PID:1916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"70⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex71⤵PID:2792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"72⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex73⤵PID:1904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"74⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex75⤵PID:1768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"76⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex77⤵PID:956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"78⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex79⤵PID:640
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"80⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex81⤵PID:1972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"82⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex83⤵PID:2092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"84⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex85⤵PID:324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"86⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex87⤵PID:2852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"88⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex89⤵PID:2836
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"90⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex91⤵PID:3028
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"92⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex93⤵PID:1008
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"94⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex95⤵PID:268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"96⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex97⤵PID:2936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"98⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex99⤵PID:1160
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"100⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex101⤵PID:2388
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"102⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex103⤵PID:2804
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"104⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex105⤵PID:2608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"106⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex107⤵PID:2272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"108⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex109⤵PID:2316
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"110⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex111⤵PID:2796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"112⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex113⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"114⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex115⤵PID:2744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"116⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex117⤵PID:1544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"118⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex119⤵PID:1384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"120⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex121⤵PID:2228
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\72fa596bea9904exeexeexeex"122⤵PID:3068
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-