Analysis
-
max time kernel
150s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
999766eac0319aexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
999766eac0319aexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
999766eac0319aexeexeexeex.exe
-
Size
185KB
-
MD5
999766eac0319ae8cfbbda2ecf496d3d
-
SHA1
d511634e8f067f6266cee3997c55feddfa212733
-
SHA256
f1703e7b6ce37b8e9e59def975fad8adce23ea0a73844e249c8e89968c521154
-
SHA512
dbabaf35d535295c1d7787bbb0cd5849798852bfdf4aecc07a7c46de339a691cf2bf00cd24291cebb56c8404fbf42d87df5eebbce6801272c1d54fce6bd865e1
-
SSDEEP
3072:KFCe6/bc8ZN3QAtj88EJ/c9SGDglw3mRYh4hflAqcAOGb0AAr0cOalA9TNh1kqli:yC3v1G/c9LDqRbg5yrGkbDXmUgD
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\CompressSave.png.exe EMoccgsg.exe File created C:\Users\Admin\Pictures\JoinPop.png.exe EMoccgsg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Control Panel\International\Geo\Nation EMoccgsg.exe -
Executes dropped EXE 2 IoCs
pid Process 2428 EMoccgsg.exe 1684 pMUYUcYI.exe -
Loads dropped DLL 20 IoCs
pid Process 2332 999766eac0319aexeexeexeex.exe 2332 999766eac0319aexeexeexeex.exe 2332 999766eac0319aexeexeexeex.exe 2332 999766eac0319aexeexeexeex.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe 2428 EMoccgsg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CQAQkIwA.exe = "C:\\ProgramData\\UEoEkwsY\\CQAQkIwA.exe" 999766eac0319aexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Run\EMoccgsg.exe = "C:\\Users\\Admin\\YwMsUswI\\EMoccgsg.exe" 999766eac0319aexeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\pMUYUcYI.exe = "C:\\ProgramData\\OCEYoEIM\\pMUYUcYI.exe" 999766eac0319aexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Run\EMoccgsg.exe = "C:\\Users\\Admin\\YwMsUswI\\EMoccgsg.exe" EMoccgsg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\pMUYUcYI.exe = "C:\\ProgramData\\OCEYoEIM\\pMUYUcYI.exe" pMUYUcYI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Windows\CurrentVersion\Run\EEIcgYwE.exe = "C:\\Users\\Admin\\JUsQsoMc\\EEIcgYwE.exe" 999766eac0319aexeexeexeex.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico EMoccgsg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2328 432 WerFault.exe 1099 2696 1928 WerFault.exe 1101 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 740 reg.exe 2132 reg.exe 2688 Process not Found 2696 reg.exe 2540 reg.exe 3020 reg.exe 1544 reg.exe 2028 reg.exe 832 reg.exe 1052 reg.exe 108 reg.exe 2600 reg.exe 1904 reg.exe 2764 Process not Found 1484 reg.exe 2324 reg.exe 2900 reg.exe 1208 reg.exe 2260 reg.exe 2480 reg.exe 2732 reg.exe 1988 reg.exe 2032 reg.exe 860 reg.exe 2292 reg.exe 1916 reg.exe 2068 reg.exe 2144 reg.exe 2456 reg.exe 884 reg.exe 1476 Process not Found 2020 Process not Found 2644 reg.exe 2492 reg.exe 2596 reg.exe 696 reg.exe 560 reg.exe 2872 reg.exe 2396 reg.exe 1592 reg.exe 2092 reg.exe 1488 reg.exe 2316 reg.exe 1184 reg.exe 1800 reg.exe 3008 reg.exe 832 reg.exe 1852 reg.exe 2316 reg.exe 2296 reg.exe 2772 Process not Found 1940 reg.exe 1192 reg.exe 1544 reg.exe 3064 reg.exe 2536 reg.exe 892 reg.exe 2912 reg.exe 3020 reg.exe 2724 reg.exe 2336 reg.exe 2712 reg.exe 2716 reg.exe 2576 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2332 999766eac0319aexeexeexeex.exe 2332 999766eac0319aexeexeexeex.exe 1772 999766eac0319aexeexeexeex.exe 1772 999766eac0319aexeexeexeex.exe 2604 999766eac0319aexeexeexeex.exe 2604 999766eac0319aexeexeexeex.exe 2300 999766eac0319aexeexeexeex.exe 2300 999766eac0319aexeexeexeex.exe 1764 999766eac0319aexeexeexeex.exe 1764 999766eac0319aexeexeexeex.exe 1644 999766eac0319aexeexeexeex.exe 1644 999766eac0319aexeexeexeex.exe 284 999766eac0319aexeexeexeex.exe 284 999766eac0319aexeexeexeex.exe 648 999766eac0319aexeexeexeex.exe 648 999766eac0319aexeexeexeex.exe 1376 999766eac0319aexeexeexeex.exe 1376 999766eac0319aexeexeexeex.exe 2216 999766eac0319aexeexeexeex.exe 2216 999766eac0319aexeexeexeex.exe 2864 999766eac0319aexeexeexeex.exe 2864 999766eac0319aexeexeexeex.exe 2920 999766eac0319aexeexeexeex.exe 2920 999766eac0319aexeexeexeex.exe 2404 999766eac0319aexeexeexeex.exe 2404 999766eac0319aexeexeexeex.exe 1196 999766eac0319aexeexeexeex.exe 1196 999766eac0319aexeexeexeex.exe 764 999766eac0319aexeexeexeex.exe 764 999766eac0319aexeexeexeex.exe 2716 999766eac0319aexeexeexeex.exe 2716 999766eac0319aexeexeexeex.exe 3036 999766eac0319aexeexeexeex.exe 3036 999766eac0319aexeexeexeex.exe 2796 999766eac0319aexeexeexeex.exe 2796 999766eac0319aexeexeexeex.exe 704 999766eac0319aexeexeexeex.exe 704 999766eac0319aexeexeexeex.exe 2268 999766eac0319aexeexeexeex.exe 2268 999766eac0319aexeexeexeex.exe 2724 999766eac0319aexeexeexeex.exe 2724 999766eac0319aexeexeexeex.exe 2488 999766eac0319aexeexeexeex.exe 2488 999766eac0319aexeexeexeex.exe 3016 999766eac0319aexeexeexeex.exe 3016 999766eac0319aexeexeexeex.exe 2132 999766eac0319aexeexeexeex.exe 2132 999766eac0319aexeexeexeex.exe 1904 999766eac0319aexeexeexeex.exe 1904 999766eac0319aexeexeexeex.exe 2112 999766eac0319aexeexeexeex.exe 2112 999766eac0319aexeexeexeex.exe 1048 999766eac0319aexeexeexeex.exe 1048 999766eac0319aexeexeexeex.exe 2496 999766eac0319aexeexeexeex.exe 2496 999766eac0319aexeexeexeex.exe 3028 999766eac0319aexeexeexeex.exe 3028 999766eac0319aexeexeexeex.exe 1912 999766eac0319aexeexeexeex.exe 1912 999766eac0319aexeexeexeex.exe 2796 999766eac0319aexeexeexeex.exe 2796 999766eac0319aexeexeexeex.exe 2584 999766eac0319aexeexeexeex.exe 2584 999766eac0319aexeexeexeex.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2428 EMoccgsg.exe 2428 EMoccgsg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2428 2332 999766eac0319aexeexeexeex.exe 28 PID 2332 wrote to memory of 2428 2332 999766eac0319aexeexeexeex.exe 28 PID 2332 wrote to memory of 2428 2332 999766eac0319aexeexeexeex.exe 28 PID 2332 wrote to memory of 2428 2332 999766eac0319aexeexeexeex.exe 28 PID 2332 wrote to memory of 1684 2332 999766eac0319aexeexeexeex.exe 29 PID 2332 wrote to memory of 1684 2332 999766eac0319aexeexeexeex.exe 29 PID 2332 wrote to memory of 1684 2332 999766eac0319aexeexeexeex.exe 29 PID 2332 wrote to memory of 1684 2332 999766eac0319aexeexeexeex.exe 29 PID 2332 wrote to memory of 1948 2332 999766eac0319aexeexeexeex.exe 30 PID 2332 wrote to memory of 1948 2332 999766eac0319aexeexeexeex.exe 30 PID 2332 wrote to memory of 1948 2332 999766eac0319aexeexeexeex.exe 30 PID 2332 wrote to memory of 1948 2332 999766eac0319aexeexeexeex.exe 30 PID 1948 wrote to memory of 1772 1948 cmd.exe 32 PID 1948 wrote to memory of 1772 1948 cmd.exe 32 PID 1948 wrote to memory of 1772 1948 cmd.exe 32 PID 1948 wrote to memory of 1772 1948 cmd.exe 32 PID 2332 wrote to memory of 268 2332 999766eac0319aexeexeexeex.exe 33 PID 2332 wrote to memory of 268 2332 999766eac0319aexeexeexeex.exe 33 PID 2332 wrote to memory of 268 2332 999766eac0319aexeexeexeex.exe 33 PID 2332 wrote to memory of 268 2332 999766eac0319aexeexeexeex.exe 33 PID 2332 wrote to memory of 1328 2332 999766eac0319aexeexeexeex.exe 34 PID 2332 wrote to memory of 1328 2332 999766eac0319aexeexeexeex.exe 34 PID 2332 wrote to memory of 1328 2332 999766eac0319aexeexeexeex.exe 34 PID 2332 wrote to memory of 1328 2332 999766eac0319aexeexeexeex.exe 34 PID 2332 wrote to memory of 2116 2332 999766eac0319aexeexeexeex.exe 35 PID 2332 wrote to memory of 2116 2332 999766eac0319aexeexeexeex.exe 35 PID 2332 wrote to memory of 2116 2332 999766eac0319aexeexeexeex.exe 35 PID 2332 wrote to memory of 2116 2332 999766eac0319aexeexeexeex.exe 35 PID 2332 wrote to memory of 1900 2332 999766eac0319aexeexeexeex.exe 40 PID 2332 wrote to memory of 1900 2332 999766eac0319aexeexeexeex.exe 40 PID 2332 wrote to memory of 1900 2332 999766eac0319aexeexeexeex.exe 40 PID 2332 wrote to memory of 1900 2332 999766eac0319aexeexeexeex.exe 40 PID 1900 wrote to memory of 2316 1900 cmd.exe 41 PID 1900 wrote to memory of 2316 1900 cmd.exe 41 PID 1900 wrote to memory of 2316 1900 cmd.exe 41 PID 1900 wrote to memory of 2316 1900 cmd.exe 41 PID 1772 wrote to memory of 2824 1772 999766eac0319aexeexeexeex.exe 42 PID 1772 wrote to memory of 2824 1772 999766eac0319aexeexeexeex.exe 42 PID 1772 wrote to memory of 2824 1772 999766eac0319aexeexeexeex.exe 42 PID 1772 wrote to memory of 2824 1772 999766eac0319aexeexeexeex.exe 42 PID 2824 wrote to memory of 2604 2824 cmd.exe 44 PID 2824 wrote to memory of 2604 2824 cmd.exe 44 PID 2824 wrote to memory of 2604 2824 cmd.exe 44 PID 2824 wrote to memory of 2604 2824 cmd.exe 44 PID 1772 wrote to memory of 2720 1772 999766eac0319aexeexeexeex.exe 45 PID 1772 wrote to memory of 2720 1772 999766eac0319aexeexeexeex.exe 45 PID 1772 wrote to memory of 2720 1772 999766eac0319aexeexeexeex.exe 45 PID 1772 wrote to memory of 2720 1772 999766eac0319aexeexeexeex.exe 45 PID 1772 wrote to memory of 2684 1772 999766eac0319aexeexeexeex.exe 46 PID 1772 wrote to memory of 2684 1772 999766eac0319aexeexeexeex.exe 46 PID 1772 wrote to memory of 2684 1772 999766eac0319aexeexeexeex.exe 46 PID 1772 wrote to memory of 2684 1772 999766eac0319aexeexeexeex.exe 46 PID 1772 wrote to memory of 2672 1772 999766eac0319aexeexeexeex.exe 52 PID 1772 wrote to memory of 2672 1772 999766eac0319aexeexeexeex.exe 52 PID 1772 wrote to memory of 2672 1772 999766eac0319aexeexeexeex.exe 52 PID 1772 wrote to memory of 2672 1772 999766eac0319aexeexeexeex.exe 52 PID 1772 wrote to memory of 2652 1772 999766eac0319aexeexeexeex.exe 51 PID 1772 wrote to memory of 2652 1772 999766eac0319aexeexeexeex.exe 51 PID 1772 wrote to memory of 2652 1772 999766eac0319aexeexeexeex.exe 51 PID 1772 wrote to memory of 2652 1772 999766eac0319aexeexeexeex.exe 51 PID 2652 wrote to memory of 2840 2652 cmd.exe 53 PID 2652 wrote to memory of 2840 2652 cmd.exe 53 PID 2652 wrote to memory of 2840 2652 cmd.exe 53 PID 2652 wrote to memory of 2840 2652 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\YwMsUswI\EMoccgsg.exe"C:\Users\Admin\YwMsUswI\EMoccgsg.exe"2⤵
- Modifies extensions of user files
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2428
-
-
C:\ProgramData\OCEYoEIM\pMUYUcYI.exe"C:\ProgramData\OCEYoEIM\pMUYUcYI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1684
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"6⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"8⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"10⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"12⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"14⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"16⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"18⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"20⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"22⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"24⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"26⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"28⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"30⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"32⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"34⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"36⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"38⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"40⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"42⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"44⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"46⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"48⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"50⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"52⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"54⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"56⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"58⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"60⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"62⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"64⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex65⤵PID:2476
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"66⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex67⤵PID:2748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"68⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex69⤵PID:2732
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"70⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex71⤵PID:2288
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"72⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex73⤵PID:2556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"74⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex75⤵PID:2488
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"76⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex77⤵PID:2896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"78⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex79⤵PID:2908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"80⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex81⤵PID:2664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"82⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex83⤵PID:2944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"84⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex85⤵PID:2656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"86⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex87⤵PID:2848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"88⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex89⤵PID:912
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"90⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex91⤵PID:2624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"92⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex93⤵PID:2340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"94⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex95⤵PID:2612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"96⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex97⤵PID:2904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"98⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex99⤵PID:1484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"100⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex101⤵PID:3008
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"102⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex103⤵PID:2692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"104⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex105⤵PID:2960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"106⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex107⤵PID:2912
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"108⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex109⤵PID:2268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"110⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex111⤵PID:908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"112⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex113⤵PID:544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"114⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex115⤵PID:1332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"116⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex117⤵PID:2204
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"118⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex119⤵PID:1644
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"120⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex121⤵PID:2028
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\999766eac0319aexeexeexeex"122⤵PID:524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-