Analysis
-
max time kernel
150s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09-07-2023 16:10
Static task
static1
Behavioral task
behavioral1
Sample
993d2674077cd5exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
993d2674077cd5exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
993d2674077cd5exeexeexeex.exe
-
Size
201KB
-
MD5
993d2674077cd569f2ea3cc2b72e8974
-
SHA1
dfcaf4adb3f29638ed75d5ec50c78b65767f16b7
-
SHA256
813461a3a081432c973b8fb35dbd0228b90432ff57c6235f99a0c854cf866f6f
-
SHA512
255af30f8a5d8ad479344fc28bbddd057c784ebb3ed60d09ad5b40de904d5a0b80255a228890cbff7b132698ec1dbc075b1ebfa0873fdc6aa043047b10c46d1c
-
SSDEEP
3072:k7rDRbCM0PPrC5l0MlhWz5wTS1F8WKv0DLyH7qIpVjoJDD+5qxAYUzyGxxizXjNH:4HVC7W12FhKsaGOiDBxAxhxxizN
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Deletes itself 1 IoCs
pid Process 2824 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 3048 neIYcEEI.exe 2296 kwAUYccE.exe -
Loads dropped DLL 20 IoCs
pid Process 2300 993d2674077cd5exeexeexeex.exe 2300 993d2674077cd5exeexeexeex.exe 2300 993d2674077cd5exeexeexeex.exe 2300 993d2674077cd5exeexeexeex.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe 3048 neIYcEEI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Run\neIYcEEI.exe = "C:\\Users\\Admin\\KmgQEoIQ\\neIYcEEI.exe" 993d2674077cd5exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kwAUYccE.exe = "C:\\ProgramData\\EWUIwEQE\\kwAUYccE.exe" 993d2674077cd5exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kwAUYccE.exe = "C:\\ProgramData\\EWUIwEQE\\kwAUYccE.exe" kwAUYccE.exe Set value (str) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Run\neIYcEEI.exe = "C:\\Users\\Admin\\KmgQEoIQ\\neIYcEEI.exe" neIYcEEI.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico neIYcEEI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 884 reg.exe 2340 reg.exe 1956 reg.exe 2128 reg.exe 936 reg.exe 1740 reg.exe 2544 reg.exe 1256 reg.exe 1680 reg.exe 1212 reg.exe 1976 reg.exe 2388 reg.exe 1920 reg.exe 2844 Process not Found 2868 reg.exe 2680 reg.exe 1040 reg.exe 1852 Process not Found 912 reg.exe 1224 reg.exe 2228 reg.exe 1168 reg.exe 2480 reg.exe 1184 reg.exe 2376 reg.exe 1172 reg.exe 2812 reg.exe 2180 reg.exe 2488 reg.exe 808 reg.exe 1796 reg.exe 3028 Process not Found 2484 reg.exe 1076 reg.exe 1404 reg.exe 3000 reg.exe 2248 reg.exe 2236 reg.exe 1472 reg.exe 1648 reg.exe 2760 reg.exe 2408 reg.exe 2584 reg.exe 2732 reg.exe 2280 reg.exe 1692 reg.exe 1680 reg.exe 2256 reg.exe 2060 reg.exe 2708 reg.exe 2520 reg.exe 2440 reg.exe 2104 reg.exe 2340 reg.exe 1044 reg.exe 2332 reg.exe 1476 reg.exe 544 reg.exe 2936 reg.exe 2036 reg.exe 2460 reg.exe 2856 reg.exe 2688 reg.exe 1492 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2300 993d2674077cd5exeexeexeex.exe 2300 993d2674077cd5exeexeexeex.exe 2936 993d2674077cd5exeexeexeex.exe 2936 993d2674077cd5exeexeexeex.exe 2568 993d2674077cd5exeexeexeex.exe 2568 993d2674077cd5exeexeexeex.exe 2540 993d2674077cd5exeexeexeex.exe 2540 993d2674077cd5exeexeexeex.exe 2564 993d2674077cd5exeexeexeex.exe 2564 993d2674077cd5exeexeexeex.exe 2932 993d2674077cd5exeexeexeex.exe 2932 993d2674077cd5exeexeexeex.exe 2080 993d2674077cd5exeexeexeex.exe 2080 993d2674077cd5exeexeexeex.exe 1828 993d2674077cd5exeexeexeex.exe 1828 993d2674077cd5exeexeexeex.exe 2928 993d2674077cd5exeexeexeex.exe 2928 993d2674077cd5exeexeexeex.exe 3064 993d2674077cd5exeexeexeex.exe 3064 993d2674077cd5exeexeexeex.exe 2540 993d2674077cd5exeexeexeex.exe 2540 993d2674077cd5exeexeexeex.exe 1892 993d2674077cd5exeexeexeex.exe 1892 993d2674077cd5exeexeexeex.exe 2184 993d2674077cd5exeexeexeex.exe 2184 993d2674077cd5exeexeexeex.exe 1260 993d2674077cd5exeexeexeex.exe 1260 993d2674077cd5exeexeexeex.exe 1352 993d2674077cd5exeexeexeex.exe 1352 993d2674077cd5exeexeexeex.exe 2468 993d2674077cd5exeexeexeex.exe 2468 993d2674077cd5exeexeexeex.exe 2456 993d2674077cd5exeexeexeex.exe 2456 993d2674077cd5exeexeexeex.exe 112 993d2674077cd5exeexeexeex.exe 112 993d2674077cd5exeexeexeex.exe 872 993d2674077cd5exeexeexeex.exe 872 993d2674077cd5exeexeexeex.exe 2128 993d2674077cd5exeexeexeex.exe 2128 993d2674077cd5exeexeexeex.exe 980 993d2674077cd5exeexeexeex.exe 980 993d2674077cd5exeexeexeex.exe 1932 993d2674077cd5exeexeexeex.exe 1932 993d2674077cd5exeexeexeex.exe 2968 993d2674077cd5exeexeexeex.exe 2968 993d2674077cd5exeexeexeex.exe 2500 993d2674077cd5exeexeexeex.exe 2500 993d2674077cd5exeexeexeex.exe 2872 993d2674077cd5exeexeexeex.exe 2872 993d2674077cd5exeexeexeex.exe 2300 993d2674077cd5exeexeexeex.exe 2300 993d2674077cd5exeexeexeex.exe 2488 993d2674077cd5exeexeexeex.exe 2488 993d2674077cd5exeexeexeex.exe 2860 993d2674077cd5exeexeexeex.exe 2860 993d2674077cd5exeexeexeex.exe 1700 993d2674077cd5exeexeexeex.exe 1700 993d2674077cd5exeexeexeex.exe 828 993d2674077cd5exeexeexeex.exe 828 993d2674077cd5exeexeexeex.exe 2112 993d2674077cd5exeexeexeex.exe 2112 993d2674077cd5exeexeexeex.exe 2768 993d2674077cd5exeexeexeex.exe 2768 993d2674077cd5exeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 3048 2300 993d2674077cd5exeexeexeex.exe 29 PID 2300 wrote to memory of 3048 2300 993d2674077cd5exeexeexeex.exe 29 PID 2300 wrote to memory of 3048 2300 993d2674077cd5exeexeexeex.exe 29 PID 2300 wrote to memory of 3048 2300 993d2674077cd5exeexeexeex.exe 29 PID 2300 wrote to memory of 2296 2300 993d2674077cd5exeexeexeex.exe 30 PID 2300 wrote to memory of 2296 2300 993d2674077cd5exeexeexeex.exe 30 PID 2300 wrote to memory of 2296 2300 993d2674077cd5exeexeexeex.exe 30 PID 2300 wrote to memory of 2296 2300 993d2674077cd5exeexeexeex.exe 30 PID 2300 wrote to memory of 2860 2300 993d2674077cd5exeexeexeex.exe 31 PID 2300 wrote to memory of 2860 2300 993d2674077cd5exeexeexeex.exe 31 PID 2300 wrote to memory of 2860 2300 993d2674077cd5exeexeexeex.exe 31 PID 2300 wrote to memory of 2860 2300 993d2674077cd5exeexeexeex.exe 31 PID 2860 wrote to memory of 2936 2860 cmd.exe 33 PID 2860 wrote to memory of 2936 2860 cmd.exe 33 PID 2860 wrote to memory of 2936 2860 cmd.exe 33 PID 2860 wrote to memory of 2936 2860 cmd.exe 33 PID 2300 wrote to memory of 2160 2300 993d2674077cd5exeexeexeex.exe 34 PID 2300 wrote to memory of 2160 2300 993d2674077cd5exeexeexeex.exe 34 PID 2300 wrote to memory of 2160 2300 993d2674077cd5exeexeexeex.exe 34 PID 2300 wrote to memory of 2160 2300 993d2674077cd5exeexeexeex.exe 34 PID 2300 wrote to memory of 2104 2300 993d2674077cd5exeexeexeex.exe 35 PID 2300 wrote to memory of 2104 2300 993d2674077cd5exeexeexeex.exe 35 PID 2300 wrote to memory of 2104 2300 993d2674077cd5exeexeexeex.exe 35 PID 2300 wrote to memory of 2104 2300 993d2674077cd5exeexeexeex.exe 35 PID 2300 wrote to memory of 2560 2300 993d2674077cd5exeexeexeex.exe 37 PID 2300 wrote to memory of 2560 2300 993d2674077cd5exeexeexeex.exe 37 PID 2300 wrote to memory of 2560 2300 993d2674077cd5exeexeexeex.exe 37 PID 2300 wrote to memory of 2560 2300 993d2674077cd5exeexeexeex.exe 37 PID 2300 wrote to memory of 1848 2300 993d2674077cd5exeexeexeex.exe 40 PID 2300 wrote to memory of 1848 2300 993d2674077cd5exeexeexeex.exe 40 PID 2300 wrote to memory of 1848 2300 993d2674077cd5exeexeexeex.exe 40 PID 2300 wrote to memory of 1848 2300 993d2674077cd5exeexeexeex.exe 40 PID 2936 wrote to memory of 1496 2936 993d2674077cd5exeexeexeex.exe 42 PID 2936 wrote to memory of 1496 2936 993d2674077cd5exeexeexeex.exe 42 PID 2936 wrote to memory of 1496 2936 993d2674077cd5exeexeexeex.exe 42 PID 2936 wrote to memory of 1496 2936 993d2674077cd5exeexeexeex.exe 42 PID 1496 wrote to memory of 2568 1496 cmd.exe 44 PID 1496 wrote to memory of 2568 1496 cmd.exe 44 PID 1496 wrote to memory of 2568 1496 cmd.exe 44 PID 1496 wrote to memory of 2568 1496 cmd.exe 44 PID 1848 wrote to memory of 1944 1848 cmd.exe 45 PID 1848 wrote to memory of 1944 1848 cmd.exe 45 PID 1848 wrote to memory of 1944 1848 cmd.exe 45 PID 1848 wrote to memory of 1944 1848 cmd.exe 45 PID 2936 wrote to memory of 2724 2936 993d2674077cd5exeexeexeex.exe 46 PID 2936 wrote to memory of 2724 2936 993d2674077cd5exeexeexeex.exe 46 PID 2936 wrote to memory of 2724 2936 993d2674077cd5exeexeexeex.exe 46 PID 2936 wrote to memory of 2724 2936 993d2674077cd5exeexeexeex.exe 46 PID 2936 wrote to memory of 2728 2936 993d2674077cd5exeexeexeex.exe 48 PID 2936 wrote to memory of 2728 2936 993d2674077cd5exeexeexeex.exe 48 PID 2936 wrote to memory of 2728 2936 993d2674077cd5exeexeexeex.exe 48 PID 2936 wrote to memory of 2728 2936 993d2674077cd5exeexeexeex.exe 48 PID 2936 wrote to memory of 2880 2936 993d2674077cd5exeexeexeex.exe 50 PID 2936 wrote to memory of 2880 2936 993d2674077cd5exeexeexeex.exe 50 PID 2936 wrote to memory of 2880 2936 993d2674077cd5exeexeexeex.exe 50 PID 2936 wrote to memory of 2880 2936 993d2674077cd5exeexeexeex.exe 50 PID 2936 wrote to memory of 2312 2936 993d2674077cd5exeexeexeex.exe 52 PID 2936 wrote to memory of 2312 2936 993d2674077cd5exeexeexeex.exe 52 PID 2936 wrote to memory of 2312 2936 993d2674077cd5exeexeexeex.exe 52 PID 2936 wrote to memory of 2312 2936 993d2674077cd5exeexeexeex.exe 52 PID 2312 wrote to memory of 2824 2312 cmd.exe 54 PID 2312 wrote to memory of 2824 2312 cmd.exe 54 PID 2312 wrote to memory of 2824 2312 cmd.exe 54 PID 2312 wrote to memory of 2824 2312 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\KmgQEoIQ\neIYcEEI.exe"C:\Users\Admin\KmgQEoIQ\neIYcEEI.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
PID:3048
-
-
C:\ProgramData\EWUIwEQE\kwAUYccE.exe"C:\ProgramData\EWUIwEQE\kwAUYccE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2296
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"6⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"8⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"10⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"12⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"14⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"16⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"18⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"20⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"22⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"24⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"26⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1260 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"28⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"30⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"32⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"34⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"36⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:872 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"38⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"40⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"42⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"44⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"46⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"48⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"50⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"52⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"54⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"56⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"58⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"60⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"62⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"64⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex65⤵PID:1172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"66⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex67⤵PID:2016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"68⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex69⤵PID:1064
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"70⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex71⤵PID:872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"72⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex73⤵PID:2928
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"74⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex75⤵PID:572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"76⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex77⤵PID:1564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"78⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex79⤵PID:2820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"80⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex81⤵PID:1968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"82⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex83⤵PID:2628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"84⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex85⤵PID:2140
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"86⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex87⤵PID:2216
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"88⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex89⤵PID:316
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"90⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex91⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"92⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex93⤵PID:1692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"94⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex95⤵PID:1392
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"96⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex97⤵PID:1344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"98⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex99⤵PID:2332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"100⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex101⤵PID:872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"102⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex103⤵PID:1456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"104⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex105⤵PID:1064
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"106⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex107⤵PID:672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"108⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex109⤵PID:2916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"110⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex111⤵PID:1304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"112⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex113⤵PID:2460
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"114⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex115⤵PID:2320
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"116⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex117⤵PID:2456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"118⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex119⤵PID:2724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"120⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex121⤵PID:1172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\993d2674077cd5exeexeexeex"122⤵PID:2232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-