Analysis
-
max time kernel
150s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
7ff76e0a60b5dcexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
7ff76e0a60b5dcexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
7ff76e0a60b5dcexeexeexeex.exe
-
Size
239KB
-
MD5
7ff76e0a60b5dc2a584ebf7fece71af2
-
SHA1
75246bf8430ba42b38068ed370f05d1e19b66a6d
-
SHA256
947ce65c823b1d88fa415e1126bc38e672f015e35e3b04206d1beecbfe0aaeae
-
SHA512
14fa3588cf8dcc2070c16421e8edfe4a8a693771029cb46a0ed0d96e626348d3e3f4217aea6b80b3e1c3f8bbd65c7581942bba7bf93b8aba97305a760cedfabf
-
SSDEEP
6144:stGCgnziB9sHh5A31HQa8qR23aC9ysQE9xFnIfJrdxpxOT025pX/b/Uo:eobAlh7GV9rDogQ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\RemovePop.png.exe eQMkcEcU.exe -
Executes dropped EXE 2 IoCs
pid Process 2268 eQMkcEcU.exe 2300 JkocEUoU.exe -
Loads dropped DLL 20 IoCs
pid Process 2356 7ff76e0a60b5dcexeexeexeex.exe 2356 7ff76e0a60b5dcexeexeexeex.exe 2356 7ff76e0a60b5dcexeexeexeex.exe 2356 7ff76e0a60b5dcexeexeexeex.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe 2268 eQMkcEcU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\eQMkcEcU.exe = "C:\\Users\\Admin\\IiYUUoEM\\eQMkcEcU.exe" 7ff76e0a60b5dcexeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JkocEUoU.exe = "C:\\ProgramData\\TgIgoAwk\\JkocEUoU.exe" 7ff76e0a60b5dcexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\eQMkcEcU.exe = "C:\\Users\\Admin\\IiYUUoEM\\eQMkcEcU.exe" eQMkcEcU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JkocEUoU.exe = "C:\\ProgramData\\TgIgoAwk\\JkocEUoU.exe" JkocEUoU.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\HCEAMkEY.exe = "C:\\Users\\Admin\\HYwgYgcU\\HCEAMkEY.exe" 7ff76e0a60b5dcexeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yWIwwMQk.exe = "C:\\ProgramData\\xGwEowAQ\\yWIwwMQk.exe" 7ff76e0a60b5dcexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2356 2600 WerFault.exe 259 3056 1108 WerFault.exe 261 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2564 reg.exe 1308 reg.exe 3060 reg.exe 1200 reg.exe 740 reg.exe 1940 reg.exe 1452 reg.exe 2752 reg.exe 1236 reg.exe 1264 reg.exe 1308 reg.exe 1676 reg.exe 2952 reg.exe 820 reg.exe 3036 reg.exe 2444 reg.exe 1356 Process not Found 1840 Process not Found 1336 reg.exe 2416 reg.exe 396 reg.exe 2328 reg.exe 1672 reg.exe 1456 reg.exe 2316 reg.exe 2324 reg.exe 2744 reg.exe 2180 reg.exe 2712 reg.exe 2244 reg.exe 624 reg.exe 2936 reg.exe 2948 reg.exe 1780 reg.exe 616 reg.exe 1608 reg.exe 2876 reg.exe 1636 Process not Found 2032 Process not Found 2352 reg.exe 2728 reg.exe 2852 reg.exe 1664 reg.exe 1764 reg.exe 904 reg.exe 2672 reg.exe 2380 reg.exe 1980 reg.exe 2504 reg.exe 2296 reg.exe 2576 reg.exe 800 reg.exe 2636 reg.exe 316 reg.exe 2588 reg.exe 1156 reg.exe 2280 reg.exe 2312 reg.exe 1984 reg.exe 904 reg.exe 1040 reg.exe 292 reg.exe 2716 reg.exe 2808 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2356 7ff76e0a60b5dcexeexeexeex.exe 2356 7ff76e0a60b5dcexeexeexeex.exe 316 7ff76e0a60b5dcexeexeexeex.exe 316 7ff76e0a60b5dcexeexeexeex.exe 2584 7ff76e0a60b5dcexeexeexeex.exe 2584 7ff76e0a60b5dcexeexeexeex.exe 2484 7ff76e0a60b5dcexeexeexeex.exe 2484 7ff76e0a60b5dcexeexeexeex.exe 2692 7ff76e0a60b5dcexeexeexeex.exe 2692 7ff76e0a60b5dcexeexeexeex.exe 2996 7ff76e0a60b5dcexeexeexeex.exe 2996 7ff76e0a60b5dcexeexeexeex.exe 2892 7ff76e0a60b5dcexeexeexeex.exe 2892 7ff76e0a60b5dcexeexeexeex.exe 2560 7ff76e0a60b5dcexeexeexeex.exe 2560 7ff76e0a60b5dcexeexeexeex.exe 2580 7ff76e0a60b5dcexeexeexeex.exe 2580 7ff76e0a60b5dcexeexeexeex.exe 820 7ff76e0a60b5dcexeexeexeex.exe 820 7ff76e0a60b5dcexeexeexeex.exe 940 7ff76e0a60b5dcexeexeexeex.exe 940 7ff76e0a60b5dcexeexeexeex.exe 2536 7ff76e0a60b5dcexeexeexeex.exe 2536 7ff76e0a60b5dcexeexeexeex.exe 548 7ff76e0a60b5dcexeexeexeex.exe 548 7ff76e0a60b5dcexeexeexeex.exe 996 7ff76e0a60b5dcexeexeexeex.exe 996 7ff76e0a60b5dcexeexeexeex.exe 2288 7ff76e0a60b5dcexeexeexeex.exe 2288 7ff76e0a60b5dcexeexeexeex.exe 2704 7ff76e0a60b5dcexeexeexeex.exe 2704 7ff76e0a60b5dcexeexeexeex.exe 752 7ff76e0a60b5dcexeexeexeex.exe 752 7ff76e0a60b5dcexeexeexeex.exe 1204 7ff76e0a60b5dcexeexeexeex.exe 1204 7ff76e0a60b5dcexeexeexeex.exe 1764 7ff76e0a60b5dcexeexeexeex.exe 1764 7ff76e0a60b5dcexeexeexeex.exe 2676 7ff76e0a60b5dcexeexeexeex.exe 2676 7ff76e0a60b5dcexeexeexeex.exe 888 7ff76e0a60b5dcexeexeexeex.exe 888 7ff76e0a60b5dcexeexeexeex.exe 2652 7ff76e0a60b5dcexeexeexeex.exe 2652 7ff76e0a60b5dcexeexeexeex.exe 1520 7ff76e0a60b5dcexeexeexeex.exe 1520 7ff76e0a60b5dcexeexeexeex.exe 1544 7ff76e0a60b5dcexeexeexeex.exe 1544 7ff76e0a60b5dcexeexeexeex.exe 2788 7ff76e0a60b5dcexeexeexeex.exe 2788 7ff76e0a60b5dcexeexeexeex.exe 800 7ff76e0a60b5dcexeexeexeex.exe 800 7ff76e0a60b5dcexeexeexeex.exe 1336 7ff76e0a60b5dcexeexeexeex.exe 1336 7ff76e0a60b5dcexeexeexeex.exe 1312 7ff76e0a60b5dcexeexeexeex.exe 1312 7ff76e0a60b5dcexeexeexeex.exe 2448 7ff76e0a60b5dcexeexeexeex.exe 2448 7ff76e0a60b5dcexeexeexeex.exe 2608 7ff76e0a60b5dcexeexeexeex.exe 2608 7ff76e0a60b5dcexeexeexeex.exe 2840 7ff76e0a60b5dcexeexeexeex.exe 2840 7ff76e0a60b5dcexeexeexeex.exe 800 7ff76e0a60b5dcexeexeexeex.exe 800 7ff76e0a60b5dcexeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2268 2356 7ff76e0a60b5dcexeexeexeex.exe 29 PID 2356 wrote to memory of 2268 2356 7ff76e0a60b5dcexeexeexeex.exe 29 PID 2356 wrote to memory of 2268 2356 7ff76e0a60b5dcexeexeexeex.exe 29 PID 2356 wrote to memory of 2268 2356 7ff76e0a60b5dcexeexeexeex.exe 29 PID 2356 wrote to memory of 2300 2356 7ff76e0a60b5dcexeexeexeex.exe 30 PID 2356 wrote to memory of 2300 2356 7ff76e0a60b5dcexeexeexeex.exe 30 PID 2356 wrote to memory of 2300 2356 7ff76e0a60b5dcexeexeexeex.exe 30 PID 2356 wrote to memory of 2300 2356 7ff76e0a60b5dcexeexeexeex.exe 30 PID 2356 wrote to memory of 2200 2356 7ff76e0a60b5dcexeexeexeex.exe 31 PID 2356 wrote to memory of 2200 2356 7ff76e0a60b5dcexeexeexeex.exe 31 PID 2356 wrote to memory of 2200 2356 7ff76e0a60b5dcexeexeexeex.exe 31 PID 2356 wrote to memory of 2200 2356 7ff76e0a60b5dcexeexeexeex.exe 31 PID 2200 wrote to memory of 316 2200 cmd.exe 33 PID 2200 wrote to memory of 316 2200 cmd.exe 33 PID 2200 wrote to memory of 316 2200 cmd.exe 33 PID 2200 wrote to memory of 316 2200 cmd.exe 33 PID 2356 wrote to memory of 2448 2356 7ff76e0a60b5dcexeexeexeex.exe 34 PID 2356 wrote to memory of 2448 2356 7ff76e0a60b5dcexeexeexeex.exe 34 PID 2356 wrote to memory of 2448 2356 7ff76e0a60b5dcexeexeexeex.exe 34 PID 2356 wrote to memory of 2448 2356 7ff76e0a60b5dcexeexeexeex.exe 34 PID 2356 wrote to memory of 2248 2356 7ff76e0a60b5dcexeexeexeex.exe 35 PID 2356 wrote to memory of 2248 2356 7ff76e0a60b5dcexeexeexeex.exe 35 PID 2356 wrote to memory of 2248 2356 7ff76e0a60b5dcexeexeexeex.exe 35 PID 2356 wrote to memory of 2248 2356 7ff76e0a60b5dcexeexeexeex.exe 35 PID 2356 wrote to memory of 676 2356 7ff76e0a60b5dcexeexeexeex.exe 37 PID 2356 wrote to memory of 676 2356 7ff76e0a60b5dcexeexeexeex.exe 37 PID 2356 wrote to memory of 676 2356 7ff76e0a60b5dcexeexeexeex.exe 37 PID 2356 wrote to memory of 676 2356 7ff76e0a60b5dcexeexeexeex.exe 37 PID 2356 wrote to memory of 764 2356 7ff76e0a60b5dcexeexeexeex.exe 39 PID 2356 wrote to memory of 764 2356 7ff76e0a60b5dcexeexeexeex.exe 39 PID 2356 wrote to memory of 764 2356 7ff76e0a60b5dcexeexeexeex.exe 39 PID 2356 wrote to memory of 764 2356 7ff76e0a60b5dcexeexeexeex.exe 39 PID 764 wrote to memory of 3064 764 cmd.exe 42 PID 764 wrote to memory of 3064 764 cmd.exe 42 PID 764 wrote to memory of 3064 764 cmd.exe 42 PID 764 wrote to memory of 3064 764 cmd.exe 42 PID 316 wrote to memory of 2360 316 7ff76e0a60b5dcexeexeexeex.exe 43 PID 316 wrote to memory of 2360 316 7ff76e0a60b5dcexeexeexeex.exe 43 PID 316 wrote to memory of 2360 316 7ff76e0a60b5dcexeexeexeex.exe 43 PID 316 wrote to memory of 2360 316 7ff76e0a60b5dcexeexeexeex.exe 43 PID 2360 wrote to memory of 2584 2360 cmd.exe 45 PID 2360 wrote to memory of 2584 2360 cmd.exe 45 PID 2360 wrote to memory of 2584 2360 cmd.exe 45 PID 2360 wrote to memory of 2584 2360 cmd.exe 45 PID 316 wrote to memory of 2624 316 7ff76e0a60b5dcexeexeexeex.exe 46 PID 316 wrote to memory of 2624 316 7ff76e0a60b5dcexeexeexeex.exe 46 PID 316 wrote to memory of 2624 316 7ff76e0a60b5dcexeexeexeex.exe 46 PID 316 wrote to memory of 2624 316 7ff76e0a60b5dcexeexeexeex.exe 46 PID 316 wrote to memory of 2676 316 7ff76e0a60b5dcexeexeexeex.exe 50 PID 316 wrote to memory of 2676 316 7ff76e0a60b5dcexeexeexeex.exe 50 PID 316 wrote to memory of 2676 316 7ff76e0a60b5dcexeexeexeex.exe 50 PID 316 wrote to memory of 2676 316 7ff76e0a60b5dcexeexeexeex.exe 50 PID 316 wrote to memory of 2744 316 7ff76e0a60b5dcexeexeexeex.exe 48 PID 316 wrote to memory of 2744 316 7ff76e0a60b5dcexeexeexeex.exe 48 PID 316 wrote to memory of 2744 316 7ff76e0a60b5dcexeexeexeex.exe 48 PID 316 wrote to memory of 2744 316 7ff76e0a60b5dcexeexeexeex.exe 48 PID 316 wrote to memory of 2608 316 7ff76e0a60b5dcexeexeexeex.exe 51 PID 316 wrote to memory of 2608 316 7ff76e0a60b5dcexeexeexeex.exe 51 PID 316 wrote to memory of 2608 316 7ff76e0a60b5dcexeexeexeex.exe 51 PID 316 wrote to memory of 2608 316 7ff76e0a60b5dcexeexeexeex.exe 51 PID 2608 wrote to memory of 1152 2608 cmd.exe 54 PID 2608 wrote to memory of 1152 2608 cmd.exe 54 PID 2608 wrote to memory of 1152 2608 cmd.exe 54 PID 2608 wrote to memory of 1152 2608 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\IiYUUoEM\eQMkcEcU.exe"C:\Users\Admin\IiYUUoEM\eQMkcEcU.exe"2⤵
- Modifies extensions of user files
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2268
-
-
C:\ProgramData\TgIgoAwk\JkocEUoU.exe"C:\ProgramData\TgIgoAwk\JkocEUoU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2300
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"6⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"8⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"10⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"12⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"14⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"16⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"18⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"20⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"22⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"24⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"26⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"28⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"30⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"32⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"34⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"36⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"38⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex39⤵
- Adds Run key to start application
PID:2032 -
C:\Users\Admin\HYwgYgcU\HCEAMkEY.exe"C:\Users\Admin\HYwgYgcU\HCEAMkEY.exe"40⤵PID:2600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 3641⤵
- Program crash
PID:2356
-
-
-
C:\ProgramData\xGwEowAQ\yWIwwMQk.exe"C:\ProgramData\xGwEowAQ\yWIwwMQk.exe"40⤵PID:1108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 3641⤵
- Program crash
PID:3056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"40⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"42⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"44⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"46⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"48⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"50⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"52⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"54⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"56⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"58⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"60⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"62⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"64⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex65⤵
- Suspicious behavior: EnumeratesProcesses
PID:800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"66⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex67⤵PID:2132
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"68⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex69⤵PID:880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"70⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex71⤵PID:2468
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"72⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex73⤵PID:2608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"74⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex75⤵PID:2328
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"76⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex77⤵PID:2248
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"78⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex79⤵PID:2892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"80⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex81⤵PID:1064
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"82⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex83⤵PID:752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"84⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex85⤵PID:2296
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"86⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex87⤵PID:1312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"88⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex89⤵PID:860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"90⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex91⤵PID:2508
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"92⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex93⤵PID:2220
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"94⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex95⤵PID:2068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"96⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex97⤵PID:1096
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"98⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex99⤵PID:1740
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"100⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex101⤵PID:1472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"102⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex103⤵PID:2608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"104⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex105⤵PID:2820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"106⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex107⤵PID:564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"108⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex109⤵PID:2572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"110⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex111⤵PID:2508
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"112⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex113⤵PID:1372
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"114⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex115⤵PID:2540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"116⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex117⤵PID:2696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"118⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex119⤵PID:2920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"120⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex121⤵PID:2052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7ff76e0a60b5dcexeexeexeex"122⤵PID:752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-