Analysis
-
max time kernel
150s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
9951030ee369c5exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
9951030ee369c5exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
9951030ee369c5exeexeexeex.exe
-
Size
194KB
-
MD5
9951030ee369c5c7b83d2f7ccdb715df
-
SHA1
4947ce5b34a05d2e4bb3864c18480694b1ebcd3a
-
SHA256
cc9acb4031ffb7d3ee760932d3f0335af8da8927e0aa35364673d2500c1627ad
-
SHA512
1a6d34970d403216a656f91a1de55d43c355986c619062d9e0ef4534c31f9224aed76118d5cfda2fa011f1590f125c980931002a7b32740598057a9f2243244e
-
SSDEEP
3072:JrZhb8TaB3pZkOrLhMDhZRRHAavbDbuz+B7:J9h75G8LhMXsE
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\CompleteDeny.png.exe TuAUwwEk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Control Panel\International\Geo\Nation TuAUwwEk.exe -
Deletes itself 1 IoCs
pid Process 2456 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2132 TuAUwwEk.exe 2284 oCAIQIkA.exe -
Loads dropped DLL 20 IoCs
pid Process 2228 9951030ee369c5exeexeexeex.exe 2228 9951030ee369c5exeexeexeex.exe 2228 9951030ee369c5exeexeexeex.exe 2228 9951030ee369c5exeexeexeex.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oCAIQIkA.exe = "C:\\ProgramData\\VaowgccY\\oCAIQIkA.exe" oCAIQIkA.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\TuAUwwEk.exe = "C:\\Users\\Admin\\moEosYgQ\\TuAUwwEk.exe" 9951030ee369c5exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oCAIQIkA.exe = "C:\\ProgramData\\VaowgccY\\oCAIQIkA.exe" 9951030ee369c5exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\TuAUwwEk.exe = "C:\\Users\\Admin\\moEosYgQ\\TuAUwwEk.exe" TuAUwwEk.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico TuAUwwEk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1712 reg.exe 1484 reg.exe 520 reg.exe 2140 reg.exe 3064 reg.exe 1228 reg.exe 2332 reg.exe 2948 reg.exe 1160 Process not Found 864 Process not Found 1736 reg.exe 2540 reg.exe 544 Process not Found 588 reg.exe 2216 reg.exe 2220 reg.exe 1720 reg.exe 2740 reg.exe 1936 reg.exe 2888 reg.exe 1736 reg.exe 2160 reg.exe 2420 reg.exe 1652 reg.exe 3016 reg.exe 2164 reg.exe 1228 reg.exe 2692 reg.exe 2088 reg.exe 684 Process not Found 3004 reg.exe 2896 reg.exe 2904 reg.exe 1620 reg.exe 2580 reg.exe 1424 reg.exe 2664 reg.exe 1764 reg.exe 2416 reg.exe 532 reg.exe 2808 reg.exe 588 reg.exe 2788 reg.exe 2860 reg.exe 1988 reg.exe 2364 reg.exe 1964 reg.exe 2128 reg.exe 2472 Process not Found 2732 reg.exe 2696 Process not Found 2260 reg.exe 1712 reg.exe 1492 reg.exe 2452 reg.exe 548 reg.exe 3004 reg.exe 2260 reg.exe 1876 reg.exe 1608 reg.exe 1652 reg.exe 864 Process not Found 2708 reg.exe 2780 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2228 9951030ee369c5exeexeexeex.exe 2228 9951030ee369c5exeexeexeex.exe 544 9951030ee369c5exeexeexeex.exe 544 9951030ee369c5exeexeexeex.exe 2540 9951030ee369c5exeexeexeex.exe 2540 9951030ee369c5exeexeexeex.exe 2444 9951030ee369c5exeexeexeex.exe 2444 9951030ee369c5exeexeexeex.exe 1808 9951030ee369c5exeexeexeex.exe 1808 9951030ee369c5exeexeexeex.exe 1576 9951030ee369c5exeexeexeex.exe 1576 9951030ee369c5exeexeexeex.exe 2912 9951030ee369c5exeexeexeex.exe 2912 9951030ee369c5exeexeexeex.exe 2072 9951030ee369c5exeexeexeex.exe 2072 9951030ee369c5exeexeexeex.exe 1264 9951030ee369c5exeexeexeex.exe 1264 9951030ee369c5exeexeexeex.exe 876 9951030ee369c5exeexeexeex.exe 876 9951030ee369c5exeexeexeex.exe 2408 9951030ee369c5exeexeexeex.exe 2408 9951030ee369c5exeexeexeex.exe 2752 9951030ee369c5exeexeexeex.exe 2752 9951030ee369c5exeexeexeex.exe 836 9951030ee369c5exeexeexeex.exe 836 9951030ee369c5exeexeexeex.exe 2060 9951030ee369c5exeexeexeex.exe 2060 9951030ee369c5exeexeexeex.exe 2192 9951030ee369c5exeexeexeex.exe 2192 9951030ee369c5exeexeexeex.exe 2140 9951030ee369c5exeexeexeex.exe 2140 9951030ee369c5exeexeexeex.exe 1020 9951030ee369c5exeexeexeex.exe 1020 9951030ee369c5exeexeexeex.exe 2368 9951030ee369c5exeexeexeex.exe 2368 9951030ee369c5exeexeexeex.exe 2256 9951030ee369c5exeexeexeex.exe 2256 9951030ee369c5exeexeexeex.exe 2160 9951030ee369c5exeexeexeex.exe 2160 9951030ee369c5exeexeexeex.exe 1028 9951030ee369c5exeexeexeex.exe 1028 9951030ee369c5exeexeexeex.exe 2744 9951030ee369c5exeexeexeex.exe 2744 9951030ee369c5exeexeexeex.exe 2800 9951030ee369c5exeexeexeex.exe 2800 9951030ee369c5exeexeexeex.exe 2308 9951030ee369c5exeexeexeex.exe 2308 9951030ee369c5exeexeexeex.exe 292 9951030ee369c5exeexeexeex.exe 292 9951030ee369c5exeexeexeex.exe 2332 9951030ee369c5exeexeexeex.exe 2332 9951030ee369c5exeexeexeex.exe 2584 9951030ee369c5exeexeexeex.exe 2584 9951030ee369c5exeexeexeex.exe 2904 9951030ee369c5exeexeexeex.exe 2904 9951030ee369c5exeexeexeex.exe 2140 9951030ee369c5exeexeexeex.exe 2140 9951030ee369c5exeexeexeex.exe 1892 9951030ee369c5exeexeexeex.exe 1892 9951030ee369c5exeexeexeex.exe 2292 9951030ee369c5exeexeexeex.exe 2292 9951030ee369c5exeexeexeex.exe 2084 9951030ee369c5exeexeexeex.exe 2084 9951030ee369c5exeexeexeex.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe 2132 TuAUwwEk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2132 2228 9951030ee369c5exeexeexeex.exe 28 PID 2228 wrote to memory of 2132 2228 9951030ee369c5exeexeexeex.exe 28 PID 2228 wrote to memory of 2132 2228 9951030ee369c5exeexeexeex.exe 28 PID 2228 wrote to memory of 2132 2228 9951030ee369c5exeexeexeex.exe 28 PID 2228 wrote to memory of 2284 2228 9951030ee369c5exeexeexeex.exe 29 PID 2228 wrote to memory of 2284 2228 9951030ee369c5exeexeexeex.exe 29 PID 2228 wrote to memory of 2284 2228 9951030ee369c5exeexeexeex.exe 29 PID 2228 wrote to memory of 2284 2228 9951030ee369c5exeexeexeex.exe 29 PID 2228 wrote to memory of 1448 2228 9951030ee369c5exeexeexeex.exe 30 PID 2228 wrote to memory of 1448 2228 9951030ee369c5exeexeexeex.exe 30 PID 2228 wrote to memory of 1448 2228 9951030ee369c5exeexeexeex.exe 30 PID 2228 wrote to memory of 1448 2228 9951030ee369c5exeexeexeex.exe 30 PID 1448 wrote to memory of 544 1448 cmd.exe 32 PID 1448 wrote to memory of 544 1448 cmd.exe 32 PID 1448 wrote to memory of 544 1448 cmd.exe 32 PID 1448 wrote to memory of 544 1448 cmd.exe 32 PID 2228 wrote to memory of 844 2228 9951030ee369c5exeexeexeex.exe 33 PID 2228 wrote to memory of 844 2228 9951030ee369c5exeexeexeex.exe 33 PID 2228 wrote to memory of 844 2228 9951030ee369c5exeexeexeex.exe 33 PID 2228 wrote to memory of 844 2228 9951030ee369c5exeexeexeex.exe 33 PID 2228 wrote to memory of 1664 2228 9951030ee369c5exeexeexeex.exe 34 PID 2228 wrote to memory of 1664 2228 9951030ee369c5exeexeexeex.exe 34 PID 2228 wrote to memory of 1664 2228 9951030ee369c5exeexeexeex.exe 34 PID 2228 wrote to memory of 1664 2228 9951030ee369c5exeexeexeex.exe 34 PID 2228 wrote to memory of 1868 2228 9951030ee369c5exeexeexeex.exe 36 PID 2228 wrote to memory of 1868 2228 9951030ee369c5exeexeexeex.exe 36 PID 2228 wrote to memory of 1868 2228 9951030ee369c5exeexeexeex.exe 36 PID 2228 wrote to memory of 1868 2228 9951030ee369c5exeexeexeex.exe 36 PID 2228 wrote to memory of 2964 2228 9951030ee369c5exeexeexeex.exe 40 PID 2228 wrote to memory of 2964 2228 9951030ee369c5exeexeexeex.exe 40 PID 2228 wrote to memory of 2964 2228 9951030ee369c5exeexeexeex.exe 40 PID 2228 wrote to memory of 2964 2228 9951030ee369c5exeexeexeex.exe 40 PID 2964 wrote to memory of 1264 2964 cmd.exe 41 PID 2964 wrote to memory of 1264 2964 cmd.exe 41 PID 2964 wrote to memory of 1264 2964 cmd.exe 41 PID 2964 wrote to memory of 1264 2964 cmd.exe 41 PID 544 wrote to memory of 2248 544 9951030ee369c5exeexeexeex.exe 42 PID 544 wrote to memory of 2248 544 9951030ee369c5exeexeexeex.exe 42 PID 544 wrote to memory of 2248 544 9951030ee369c5exeexeexeex.exe 42 PID 544 wrote to memory of 2248 544 9951030ee369c5exeexeexeex.exe 42 PID 2248 wrote to memory of 2540 2248 cmd.exe 44 PID 2248 wrote to memory of 2540 2248 cmd.exe 44 PID 2248 wrote to memory of 2540 2248 cmd.exe 44 PID 2248 wrote to memory of 2540 2248 cmd.exe 44 PID 544 wrote to memory of 2580 544 9951030ee369c5exeexeexeex.exe 45 PID 544 wrote to memory of 2580 544 9951030ee369c5exeexeexeex.exe 45 PID 544 wrote to memory of 2580 544 9951030ee369c5exeexeexeex.exe 45 PID 544 wrote to memory of 2580 544 9951030ee369c5exeexeexeex.exe 45 PID 544 wrote to memory of 2708 544 9951030ee369c5exeexeexeex.exe 46 PID 544 wrote to memory of 2708 544 9951030ee369c5exeexeexeex.exe 46 PID 544 wrote to memory of 2708 544 9951030ee369c5exeexeexeex.exe 46 PID 544 wrote to memory of 2708 544 9951030ee369c5exeexeexeex.exe 46 PID 544 wrote to memory of 2772 544 9951030ee369c5exeexeexeex.exe 47 PID 544 wrote to memory of 2772 544 9951030ee369c5exeexeexeex.exe 47 PID 544 wrote to memory of 2772 544 9951030ee369c5exeexeexeex.exe 47 PID 544 wrote to memory of 2772 544 9951030ee369c5exeexeexeex.exe 47 PID 544 wrote to memory of 2900 544 9951030ee369c5exeexeexeex.exe 52 PID 544 wrote to memory of 2900 544 9951030ee369c5exeexeexeex.exe 52 PID 544 wrote to memory of 2900 544 9951030ee369c5exeexeexeex.exe 52 PID 544 wrote to memory of 2900 544 9951030ee369c5exeexeexeex.exe 52 PID 2900 wrote to memory of 1364 2900 cmd.exe 53 PID 2900 wrote to memory of 1364 2900 cmd.exe 53 PID 2900 wrote to memory of 1364 2900 cmd.exe 53 PID 2900 wrote to memory of 1364 2900 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\moEosYgQ\TuAUwwEk.exe"C:\Users\Admin\moEosYgQ\TuAUwwEk.exe"2⤵
- Modifies extensions of user files
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2132
-
-
C:\ProgramData\VaowgccY\oCAIQIkA.exe"C:\ProgramData\VaowgccY\oCAIQIkA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2284
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"6⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"8⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"10⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"12⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"14⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"16⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1264 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"18⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"20⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"22⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"24⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"26⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"28⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"30⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"32⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"34⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"36⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"38⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"40⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"42⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"44⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"46⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"48⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:292 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"50⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"52⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"54⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"56⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"58⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"60⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"62⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"64⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex65⤵PID:2908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"66⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex67⤵PID:1080
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"68⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex69⤵PID:1764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"70⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex71⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"72⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex73⤵PID:2520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"74⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex75⤵PID:2864
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"76⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex77⤵PID:1740
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"78⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex79⤵PID:1736
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"80⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex81⤵PID:1016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"82⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex83⤵PID:2688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"84⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex85⤵PID:2620
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"86⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex87⤵PID:2472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"88⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex89⤵PID:2012
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"90⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex91⤵PID:844
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"92⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex93⤵PID:3032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"94⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex95⤵PID:2196
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"96⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex97⤵PID:1948
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"98⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex99⤵PID:1820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"100⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex101⤵PID:700
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"102⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex103⤵PID:920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"104⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex105⤵PID:2888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"106⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex107⤵PID:976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"108⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex109⤵PID:1892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"110⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex111⤵PID:2784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"112⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex113⤵PID:3024
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"114⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex115⤵PID:2908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"116⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex117⤵PID:2432
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"118⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex119⤵PID:1948
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"120⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex121⤵PID:2916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"122⤵PID:1080
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-