Analysis
-
max time kernel
150s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09-07-2023 15:09
Static task
static1
Behavioral task
behavioral1
Sample
97770c0f488814exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
97770c0f488814exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
97770c0f488814exeexeexeex.exe
-
Size
209KB
-
MD5
97770c0f4888147bbc71747aa68927aa
-
SHA1
7c17880fdc80b7a8a2781c1fd94897318165d4ca
-
SHA256
79d2295e28737b94cc736944990d2232552f730c2538cef88bdd6c31657d0c62
-
SHA512
a8a9c10566ddf53896f32528b2165005f0e9b590ef419170be0c621449d2604dde641640c7629616d8e89204465e260529c9f6eed9b48a1d80ace424b905b67b
-
SSDEEP
6144:SVTXUz4zLUc/z5TjzPvEE0Icu+sW7qJ85oNZXl:UAzkpjjvEE0Icu+s2qJZZXl
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2416 ckokMEcM.exe 2864 EOYwIcUQ.exe -
Loads dropped DLL 20 IoCs
pid Process 2428 97770c0f488814exeexeexeex.exe 2428 97770c0f488814exeexeexeex.exe 2428 97770c0f488814exeexeexeex.exe 2428 97770c0f488814exeexeexeex.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe 2416 ckokMEcM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Run\ckokMEcM.exe = "C:\\Users\\Admin\\UuQIEoEw\\ckokMEcM.exe" 97770c0f488814exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EOYwIcUQ.exe = "C:\\ProgramData\\YAkYwEAc\\EOYwIcUQ.exe" 97770c0f488814exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Run\ckokMEcM.exe = "C:\\Users\\Admin\\UuQIEoEw\\ckokMEcM.exe" ckokMEcM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EOYwIcUQ.exe = "C:\\ProgramData\\YAkYwEAc\\EOYwIcUQ.exe" EOYwIcUQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2840 reg.exe 1512 reg.exe 2060 reg.exe 2464 reg.exe 836 reg.exe 1824 reg.exe 528 Process not Found 2428 reg.exe 632 reg.exe 1628 reg.exe 2776 reg.exe 1612 reg.exe 2208 reg.exe 2312 reg.exe 3060 reg.exe 1700 reg.exe 2992 Process not Found 884 reg.exe 2752 reg.exe 556 reg.exe 2060 Process not Found 320 reg.exe 2500 Process not Found 2816 reg.exe 1696 reg.exe 1880 reg.exe 1104 reg.exe 1412 reg.exe 2112 reg.exe 1168 reg.exe 1788 Process not Found 564 reg.exe 2844 reg.exe 2188 reg.exe 2880 reg.exe 1952 reg.exe 1700 reg.exe 896 reg.exe 2392 reg.exe 3060 Process not Found 528 reg.exe 2264 reg.exe 1628 reg.exe 868 reg.exe 1280 reg.exe 948 reg.exe 2880 reg.exe 2128 Process not Found 1736 reg.exe 2884 reg.exe 1864 reg.exe 2816 reg.exe 1036 reg.exe 2916 Process not Found 2912 reg.exe 1504 reg.exe 2688 reg.exe 2024 reg.exe 1036 reg.exe 1060 reg.exe 2852 Process not Found 3028 reg.exe 2596 reg.exe 2204 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2428 97770c0f488814exeexeexeex.exe 2428 97770c0f488814exeexeexeex.exe 2208 97770c0f488814exeexeexeex.exe 2208 97770c0f488814exeexeexeex.exe 2620 97770c0f488814exeexeexeex.exe 2620 97770c0f488814exeexeexeex.exe 2600 97770c0f488814exeexeexeex.exe 2600 97770c0f488814exeexeexeex.exe 784 97770c0f488814exeexeexeex.exe 784 97770c0f488814exeexeexeex.exe 2520 97770c0f488814exeexeexeex.exe 2520 97770c0f488814exeexeexeex.exe 1588 97770c0f488814exeexeexeex.exe 1588 97770c0f488814exeexeexeex.exe 564 97770c0f488814exeexeexeex.exe 564 97770c0f488814exeexeexeex.exe 2872 97770c0f488814exeexeexeex.exe 2872 97770c0f488814exeexeexeex.exe 240 97770c0f488814exeexeexeex.exe 240 97770c0f488814exeexeexeex.exe 1884 97770c0f488814exeexeexeex.exe 1884 97770c0f488814exeexeexeex.exe 1668 97770c0f488814exeexeexeex.exe 1668 97770c0f488814exeexeexeex.exe 596 97770c0f488814exeexeexeex.exe 596 97770c0f488814exeexeexeex.exe 1680 97770c0f488814exeexeexeex.exe 1680 97770c0f488814exeexeexeex.exe 2640 97770c0f488814exeexeexeex.exe 2640 97770c0f488814exeexeexeex.exe 2716 97770c0f488814exeexeexeex.exe 2716 97770c0f488814exeexeexeex.exe 2600 97770c0f488814exeexeexeex.exe 2600 97770c0f488814exeexeexeex.exe 1704 97770c0f488814exeexeexeex.exe 1704 97770c0f488814exeexeexeex.exe 1172 97770c0f488814exeexeexeex.exe 1172 97770c0f488814exeexeexeex.exe 2112 97770c0f488814exeexeexeex.exe 2112 97770c0f488814exeexeexeex.exe 2196 97770c0f488814exeexeexeex.exe 2196 97770c0f488814exeexeexeex.exe 3036 97770c0f488814exeexeexeex.exe 3036 97770c0f488814exeexeexeex.exe 2532 97770c0f488814exeexeexeex.exe 2532 97770c0f488814exeexeexeex.exe 2892 97770c0f488814exeexeexeex.exe 2892 97770c0f488814exeexeexeex.exe 1360 97770c0f488814exeexeexeex.exe 1360 97770c0f488814exeexeexeex.exe 2612 97770c0f488814exeexeexeex.exe 2612 97770c0f488814exeexeexeex.exe 2528 97770c0f488814exeexeexeex.exe 2528 97770c0f488814exeexeexeex.exe 3016 97770c0f488814exeexeexeex.exe 3016 97770c0f488814exeexeexeex.exe 1036 97770c0f488814exeexeexeex.exe 1036 97770c0f488814exeexeexeex.exe 2160 97770c0f488814exeexeexeex.exe 2160 97770c0f488814exeexeexeex.exe 692 97770c0f488814exeexeexeex.exe 692 97770c0f488814exeexeexeex.exe 2768 97770c0f488814exeexeexeex.exe 2768 97770c0f488814exeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2416 2428 97770c0f488814exeexeexeex.exe 29 PID 2428 wrote to memory of 2416 2428 97770c0f488814exeexeexeex.exe 29 PID 2428 wrote to memory of 2416 2428 97770c0f488814exeexeexeex.exe 29 PID 2428 wrote to memory of 2416 2428 97770c0f488814exeexeexeex.exe 29 PID 2428 wrote to memory of 2864 2428 97770c0f488814exeexeexeex.exe 30 PID 2428 wrote to memory of 2864 2428 97770c0f488814exeexeexeex.exe 30 PID 2428 wrote to memory of 2864 2428 97770c0f488814exeexeexeex.exe 30 PID 2428 wrote to memory of 2864 2428 97770c0f488814exeexeexeex.exe 30 PID 2428 wrote to memory of 2976 2428 97770c0f488814exeexeexeex.exe 31 PID 2428 wrote to memory of 2976 2428 97770c0f488814exeexeexeex.exe 31 PID 2428 wrote to memory of 2976 2428 97770c0f488814exeexeexeex.exe 31 PID 2428 wrote to memory of 2976 2428 97770c0f488814exeexeexeex.exe 31 PID 2976 wrote to memory of 2208 2976 cmd.exe 33 PID 2976 wrote to memory of 2208 2976 cmd.exe 33 PID 2976 wrote to memory of 2208 2976 cmd.exe 33 PID 2976 wrote to memory of 2208 2976 cmd.exe 33 PID 2428 wrote to memory of 320 2428 97770c0f488814exeexeexeex.exe 34 PID 2428 wrote to memory of 320 2428 97770c0f488814exeexeexeex.exe 34 PID 2428 wrote to memory of 320 2428 97770c0f488814exeexeexeex.exe 34 PID 2428 wrote to memory of 320 2428 97770c0f488814exeexeexeex.exe 34 PID 2428 wrote to memory of 1168 2428 97770c0f488814exeexeexeex.exe 35 PID 2428 wrote to memory of 1168 2428 97770c0f488814exeexeexeex.exe 35 PID 2428 wrote to memory of 1168 2428 97770c0f488814exeexeexeex.exe 35 PID 2428 wrote to memory of 1168 2428 97770c0f488814exeexeexeex.exe 35 PID 2428 wrote to memory of 632 2428 97770c0f488814exeexeexeex.exe 36 PID 2428 wrote to memory of 632 2428 97770c0f488814exeexeexeex.exe 36 PID 2428 wrote to memory of 632 2428 97770c0f488814exeexeexeex.exe 36 PID 2428 wrote to memory of 632 2428 97770c0f488814exeexeexeex.exe 36 PID 2428 wrote to memory of 572 2428 97770c0f488814exeexeexeex.exe 38 PID 2428 wrote to memory of 572 2428 97770c0f488814exeexeexeex.exe 38 PID 2428 wrote to memory of 572 2428 97770c0f488814exeexeexeex.exe 38 PID 2428 wrote to memory of 572 2428 97770c0f488814exeexeexeex.exe 38 PID 572 wrote to memory of 1500 572 cmd.exe 42 PID 572 wrote to memory of 1500 572 cmd.exe 42 PID 572 wrote to memory of 1500 572 cmd.exe 42 PID 572 wrote to memory of 1500 572 cmd.exe 42 PID 2208 wrote to memory of 1404 2208 97770c0f488814exeexeexeex.exe 43 PID 2208 wrote to memory of 1404 2208 97770c0f488814exeexeexeex.exe 43 PID 2208 wrote to memory of 1404 2208 97770c0f488814exeexeexeex.exe 43 PID 2208 wrote to memory of 1404 2208 97770c0f488814exeexeexeex.exe 43 PID 1404 wrote to memory of 2620 1404 cmd.exe 45 PID 1404 wrote to memory of 2620 1404 cmd.exe 45 PID 1404 wrote to memory of 2620 1404 cmd.exe 45 PID 1404 wrote to memory of 2620 1404 cmd.exe 45 PID 2208 wrote to memory of 2732 2208 97770c0f488814exeexeexeex.exe 46 PID 2208 wrote to memory of 2732 2208 97770c0f488814exeexeexeex.exe 46 PID 2208 wrote to memory of 2732 2208 97770c0f488814exeexeexeex.exe 46 PID 2208 wrote to memory of 2732 2208 97770c0f488814exeexeexeex.exe 46 PID 2208 wrote to memory of 2876 2208 97770c0f488814exeexeexeex.exe 48 PID 2208 wrote to memory of 2876 2208 97770c0f488814exeexeexeex.exe 48 PID 2208 wrote to memory of 2876 2208 97770c0f488814exeexeexeex.exe 48 PID 2208 wrote to memory of 2876 2208 97770c0f488814exeexeexeex.exe 48 PID 2208 wrote to memory of 2584 2208 97770c0f488814exeexeexeex.exe 49 PID 2208 wrote to memory of 2584 2208 97770c0f488814exeexeexeex.exe 49 PID 2208 wrote to memory of 2584 2208 97770c0f488814exeexeexeex.exe 49 PID 2208 wrote to memory of 2584 2208 97770c0f488814exeexeexeex.exe 49 PID 2208 wrote to memory of 2868 2208 97770c0f488814exeexeexeex.exe 53 PID 2208 wrote to memory of 2868 2208 97770c0f488814exeexeexeex.exe 53 PID 2208 wrote to memory of 2868 2208 97770c0f488814exeexeexeex.exe 53 PID 2208 wrote to memory of 2868 2208 97770c0f488814exeexeexeex.exe 53 PID 2868 wrote to memory of 2228 2868 cmd.exe 54 PID 2868 wrote to memory of 2228 2868 cmd.exe 54 PID 2868 wrote to memory of 2228 2868 cmd.exe 54 PID 2868 wrote to memory of 2228 2868 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\UuQIEoEw\ckokMEcM.exe"C:\Users\Admin\UuQIEoEw\ckokMEcM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2416
-
-
C:\ProgramData\YAkYwEAc\EOYwIcUQ.exe"C:\ProgramData\YAkYwEAc\EOYwIcUQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2864
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"6⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"8⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"10⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"12⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"14⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"16⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"18⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"20⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"22⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"24⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"26⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"28⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"30⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"32⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"34⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"36⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"38⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"40⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"42⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"44⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"46⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"48⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"50⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"52⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"54⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"56⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"58⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"60⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"62⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"64⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex65⤵PID:908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"66⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex67⤵PID:1068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"68⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex69⤵PID:1172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"70⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex71⤵PID:564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"72⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex73⤵PID:1048
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"74⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex75⤵PID:1732
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"76⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex77⤵PID:2352
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"78⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex79⤵PID:596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"80⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex81⤵PID:1172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"82⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex83⤵PID:2536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"84⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex85⤵PID:1048
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"86⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex87⤵PID:1036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"88⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex89⤵PID:1032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"90⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex91⤵PID:2304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"92⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex93⤵PID:2656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"94⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex95⤵PID:1972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"96⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex97⤵PID:2588
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"98⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex99⤵PID:1680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"100⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex101⤵PID:2996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"102⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex103⤵PID:2960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"104⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex105⤵PID:2308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"106⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex107⤵PID:2464
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"108⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex109⤵PID:1004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"110⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex111⤵PID:1584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"112⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex113⤵PID:2720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"114⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex115⤵PID:1176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"116⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex117⤵PID:2544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"118⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex119⤵PID:1104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"120⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex121⤵PID:2532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\97770c0f488814exeexeexeex"122⤵PID:696
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-