Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
9951030ee369c5exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
9951030ee369c5exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
9951030ee369c5exeexeexeex.exe
-
Size
194KB
-
MD5
9951030ee369c5c7b83d2f7ccdb715df
-
SHA1
4947ce5b34a05d2e4bb3864c18480694b1ebcd3a
-
SHA256
cc9acb4031ffb7d3ee760932d3f0335af8da8927e0aa35364673d2500c1627ad
-
SHA512
1a6d34970d403216a656f91a1de55d43c355986c619062d9e0ef4534c31f9224aed76118d5cfda2fa011f1590f125c980931002a7b32740598057a9f2243244e
-
SSDEEP
3072:JrZhb8TaB3pZkOrLhMDhZRRHAavbDbuz+B7:J9h75G8LhMXsE
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\ConvertToReceive.png.exe NIoAEUYk.exe -
Executes dropped EXE 3 IoCs
pid Process 2296 NIoAEUYk.exe 2844 ZyQQwoMI.exe 2256 Process not Found -
Loads dropped DLL 27 IoCs
pid Process 2344 9951030ee369c5exeexeexeex.exe 2344 9951030ee369c5exeexeexeex.exe 2344 9951030ee369c5exeexeexeex.exe 2344 9951030ee369c5exeexeexeex.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 2296 NIoAEUYk.exe 796 Process not Found 796 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found 1420 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ZyQQwoMI.exe = "C:\\ProgramData\\iYAIsIwM\\ZyQQwoMI.exe" ZyQQwoMI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\HCEAMkEY.exe = "C:\\Users\\Admin\\HYwgYgcU\\HCEAMkEY.exe" 9951030ee369c5exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yWIwwMQk.exe = "C:\\ProgramData\\xGwEowAQ\\yWIwwMQk.exe" 9951030ee369c5exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\HCEAMkEY.exe = "C:\\Users\\Admin\\HYwgYgcU\\HCEAMkEY.exe" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\NIoAEUYk.exe = "C:\\Users\\Admin\\aQcIIowU\\NIoAEUYk.exe" 9951030ee369c5exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ZyQQwoMI.exe = "C:\\ProgramData\\iYAIsIwM\\ZyQQwoMI.exe" 9951030ee369c5exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\NIoAEUYk.exe = "C:\\Users\\Admin\\aQcIIowU\\NIoAEUYk.exe" NIoAEUYk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2064 2900 WerFault.exe 452 1420 2256 Process not Found 1858 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1752 Process not Found 2256 reg.exe 2500 reg.exe 1628 reg.exe 1520 Process not Found 2272 Process not Found 2436 reg.exe 2580 reg.exe 852 reg.exe 3036 Process not Found 2580 reg.exe 2748 reg.exe 1596 Process not Found 2232 reg.exe 676 reg.exe 2404 reg.exe 1952 reg.exe 1692 reg.exe 1056 reg.exe 2516 reg.exe 2580 reg.exe 2580 reg.exe 2264 reg.exe 2716 reg.exe 2900 reg.exe 1940 reg.exe 1876 reg.exe 1692 reg.exe 2812 reg.exe 2400 reg.exe 1816 reg.exe 2136 reg.exe 620 Process not Found 1052 reg.exe 712 reg.exe 2160 reg.exe 2788 reg.exe 784 reg.exe 1904 reg.exe 2328 reg.exe 2964 reg.exe 2196 reg.exe 1212 reg.exe 3012 reg.exe 2316 reg.exe 780 Process not Found 2424 reg.exe 3024 reg.exe 2472 reg.exe 324 reg.exe 2580 reg.exe 2588 reg.exe 1880 reg.exe 2824 reg.exe 2284 reg.exe 3016 reg.exe 2872 reg.exe 2468 reg.exe 1580 reg.exe 2248 reg.exe 2604 reg.exe 2972 reg.exe 2124 reg.exe 2244 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2344 9951030ee369c5exeexeexeex.exe 2344 9951030ee369c5exeexeexeex.exe 2912 9951030ee369c5exeexeexeex.exe 2912 9951030ee369c5exeexeexeex.exe 2624 9951030ee369c5exeexeexeex.exe 2624 9951030ee369c5exeexeexeex.exe 1932 9951030ee369c5exeexeexeex.exe 1932 9951030ee369c5exeexeexeex.exe 2044 9951030ee369c5exeexeexeex.exe 2044 9951030ee369c5exeexeexeex.exe 1096 9951030ee369c5exeexeexeex.exe 1096 9951030ee369c5exeexeexeex.exe 2164 9951030ee369c5exeexeexeex.exe 2164 9951030ee369c5exeexeexeex.exe 2088 9951030ee369c5exeexeexeex.exe 2088 9951030ee369c5exeexeexeex.exe 2688 9951030ee369c5exeexeexeex.exe 2688 9951030ee369c5exeexeexeex.exe 2496 9951030ee369c5exeexeexeex.exe 2496 9951030ee369c5exeexeexeex.exe 916 9951030ee369c5exeexeexeex.exe 916 9951030ee369c5exeexeexeex.exe 2764 9951030ee369c5exeexeexeex.exe 2764 9951030ee369c5exeexeexeex.exe 2876 9951030ee369c5exeexeexeex.exe 2876 9951030ee369c5exeexeexeex.exe 2164 9951030ee369c5exeexeexeex.exe 2164 9951030ee369c5exeexeexeex.exe 2252 9951030ee369c5exeexeexeex.exe 2252 9951030ee369c5exeexeexeex.exe 2512 9951030ee369c5exeexeexeex.exe 2512 9951030ee369c5exeexeexeex.exe 2496 9951030ee369c5exeexeexeex.exe 2496 9951030ee369c5exeexeexeex.exe 2732 9951030ee369c5exeexeexeex.exe 2732 9951030ee369c5exeexeexeex.exe 1676 9951030ee369c5exeexeexeex.exe 1676 9951030ee369c5exeexeexeex.exe 2876 9951030ee369c5exeexeexeex.exe 2876 9951030ee369c5exeexeexeex.exe 2648 9951030ee369c5exeexeexeex.exe 2648 9951030ee369c5exeexeexeex.exe 2436 9951030ee369c5exeexeexeex.exe 2436 9951030ee369c5exeexeexeex.exe 1364 9951030ee369c5exeexeexeex.exe 1364 9951030ee369c5exeexeexeex.exe 2540 9951030ee369c5exeexeexeex.exe 2540 9951030ee369c5exeexeexeex.exe 2828 9951030ee369c5exeexeexeex.exe 2828 9951030ee369c5exeexeexeex.exe 2324 9951030ee369c5exeexeexeex.exe 2324 9951030ee369c5exeexeexeex.exe 1984 9951030ee369c5exeexeexeex.exe 1984 9951030ee369c5exeexeexeex.exe 2492 9951030ee369c5exeexeexeex.exe 2492 9951030ee369c5exeexeexeex.exe 2500 9951030ee369c5exeexeexeex.exe 2500 9951030ee369c5exeexeexeex.exe 2016 9951030ee369c5exeexeexeex.exe 2016 9951030ee369c5exeexeexeex.exe 1220 9951030ee369c5exeexeexeex.exe 1220 9951030ee369c5exeexeexeex.exe 1920 9951030ee369c5exeexeexeex.exe 1920 9951030ee369c5exeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2296 2344 9951030ee369c5exeexeexeex.exe 28 PID 2344 wrote to memory of 2296 2344 9951030ee369c5exeexeexeex.exe 28 PID 2344 wrote to memory of 2296 2344 9951030ee369c5exeexeexeex.exe 28 PID 2344 wrote to memory of 2296 2344 9951030ee369c5exeexeexeex.exe 28 PID 2344 wrote to memory of 2844 2344 9951030ee369c5exeexeexeex.exe 29 PID 2344 wrote to memory of 2844 2344 9951030ee369c5exeexeexeex.exe 29 PID 2344 wrote to memory of 2844 2344 9951030ee369c5exeexeexeex.exe 29 PID 2344 wrote to memory of 2844 2344 9951030ee369c5exeexeexeex.exe 29 PID 2344 wrote to memory of 2080 2344 9951030ee369c5exeexeexeex.exe 30 PID 2344 wrote to memory of 2080 2344 9951030ee369c5exeexeexeex.exe 30 PID 2344 wrote to memory of 2080 2344 9951030ee369c5exeexeexeex.exe 30 PID 2344 wrote to memory of 2080 2344 9951030ee369c5exeexeexeex.exe 30 PID 2080 wrote to memory of 2912 2080 cmd.exe 32 PID 2080 wrote to memory of 2912 2080 cmd.exe 32 PID 2080 wrote to memory of 2912 2080 cmd.exe 32 PID 2080 wrote to memory of 2912 2080 cmd.exe 32 PID 2344 wrote to memory of 1904 2344 9951030ee369c5exeexeexeex.exe 33 PID 2344 wrote to memory of 1904 2344 9951030ee369c5exeexeexeex.exe 33 PID 2344 wrote to memory of 1904 2344 9951030ee369c5exeexeexeex.exe 33 PID 2344 wrote to memory of 1904 2344 9951030ee369c5exeexeexeex.exe 33 PID 2344 wrote to memory of 1104 2344 9951030ee369c5exeexeexeex.exe 34 PID 2344 wrote to memory of 1104 2344 9951030ee369c5exeexeexeex.exe 34 PID 2344 wrote to memory of 1104 2344 9951030ee369c5exeexeexeex.exe 34 PID 2344 wrote to memory of 1104 2344 9951030ee369c5exeexeexeex.exe 34 PID 2344 wrote to memory of 1984 2344 9951030ee369c5exeexeexeex.exe 36 PID 2344 wrote to memory of 1984 2344 9951030ee369c5exeexeexeex.exe 36 PID 2344 wrote to memory of 1984 2344 9951030ee369c5exeexeexeex.exe 36 PID 2344 wrote to memory of 1984 2344 9951030ee369c5exeexeexeex.exe 36 PID 2344 wrote to memory of 2144 2344 9951030ee369c5exeexeexeex.exe 38 PID 2344 wrote to memory of 2144 2344 9951030ee369c5exeexeexeex.exe 38 PID 2344 wrote to memory of 2144 2344 9951030ee369c5exeexeexeex.exe 38 PID 2344 wrote to memory of 2144 2344 9951030ee369c5exeexeexeex.exe 38 PID 2144 wrote to memory of 2956 2144 cmd.exe 41 PID 2144 wrote to memory of 2956 2144 cmd.exe 41 PID 2144 wrote to memory of 2956 2144 cmd.exe 41 PID 2144 wrote to memory of 2956 2144 cmd.exe 41 PID 2912 wrote to memory of 2668 2912 9951030ee369c5exeexeexeex.exe 42 PID 2912 wrote to memory of 2668 2912 9951030ee369c5exeexeexeex.exe 42 PID 2912 wrote to memory of 2668 2912 9951030ee369c5exeexeexeex.exe 42 PID 2912 wrote to memory of 2668 2912 9951030ee369c5exeexeexeex.exe 42 PID 2668 wrote to memory of 2624 2668 cmd.exe 44 PID 2668 wrote to memory of 2624 2668 cmd.exe 44 PID 2668 wrote to memory of 2624 2668 cmd.exe 44 PID 2668 wrote to memory of 2624 2668 cmd.exe 44 PID 2912 wrote to memory of 2576 2912 9951030ee369c5exeexeexeex.exe 45 PID 2912 wrote to memory of 2576 2912 9951030ee369c5exeexeexeex.exe 45 PID 2912 wrote to memory of 2576 2912 9951030ee369c5exeexeexeex.exe 45 PID 2912 wrote to memory of 2576 2912 9951030ee369c5exeexeexeex.exe 45 PID 2912 wrote to memory of 2852 2912 9951030ee369c5exeexeexeex.exe 48 PID 2912 wrote to memory of 2852 2912 9951030ee369c5exeexeexeex.exe 48 PID 2912 wrote to memory of 2852 2912 9951030ee369c5exeexeexeex.exe 48 PID 2912 wrote to memory of 2852 2912 9951030ee369c5exeexeexeex.exe 48 PID 2912 wrote to memory of 2696 2912 9951030ee369c5exeexeexeex.exe 46 PID 2912 wrote to memory of 2696 2912 9951030ee369c5exeexeexeex.exe 46 PID 2912 wrote to memory of 2696 2912 9951030ee369c5exeexeexeex.exe 46 PID 2912 wrote to memory of 2696 2912 9951030ee369c5exeexeexeex.exe 46 PID 2912 wrote to memory of 2496 2912 9951030ee369c5exeexeexeex.exe 50 PID 2912 wrote to memory of 2496 2912 9951030ee369c5exeexeexeex.exe 50 PID 2912 wrote to memory of 2496 2912 9951030ee369c5exeexeexeex.exe 50 PID 2912 wrote to memory of 2496 2912 9951030ee369c5exeexeexeex.exe 50 PID 2496 wrote to memory of 2516 2496 cmd.exe 53 PID 2496 wrote to memory of 2516 2496 cmd.exe 53 PID 2496 wrote to memory of 2516 2496 cmd.exe 53 PID 2496 wrote to memory of 2516 2496 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\aQcIIowU\NIoAEUYk.exe"C:\Users\Admin\aQcIIowU\NIoAEUYk.exe"2⤵
- Modifies extensions of user files
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2296
-
-
C:\ProgramData\iYAIsIwM\ZyQQwoMI.exe"C:\ProgramData\iYAIsIwM\ZyQQwoMI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2844
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"6⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"8⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"10⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"12⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"14⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"16⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"18⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"20⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"22⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"24⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"26⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"28⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"30⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"32⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"34⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"36⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"38⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"40⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"42⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"44⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"46⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"48⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"50⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"52⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"54⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"56⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"58⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"60⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"62⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"64⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex65⤵PID:2636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"66⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex67⤵PID:932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"68⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex69⤵PID:1996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"70⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex71⤵
- Adds Run key to start application
PID:796 -
C:\Users\Admin\HYwgYgcU\HCEAMkEY.exe"C:\Users\Admin\HYwgYgcU\HCEAMkEY.exe"72⤵PID:2428
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"72⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex73⤵PID:524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"74⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex75⤵PID:2660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"76⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex77⤵PID:2444
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"78⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex79⤵PID:1372
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"80⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex81⤵PID:2872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"82⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex83⤵PID:2984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"84⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex85⤵PID:2628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"86⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex87⤵PID:2492
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"88⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex89⤵PID:2396
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"90⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex91⤵PID:2828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"92⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex93⤵PID:2756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"94⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex95⤵PID:1720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"96⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex97⤵PID:1816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"98⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex99⤵PID:2492
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"100⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex101⤵PID:1488
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"102⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex103⤵PID:2156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"104⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex105⤵PID:2852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"106⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex107⤵PID:1656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"108⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex109⤵PID:1560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"110⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex111⤵PID:1724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"112⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex113⤵PID:860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"114⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex115⤵PID:2520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"116⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex117⤵PID:2512
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"118⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex119⤵PID:2276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"120⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex121⤵PID:2680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9951030ee369c5exeexeexeex"122⤵PID:2720
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-