Analysis
-
max time kernel
150s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
ad19d17bd6f1e1exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ad19d17bd6f1e1exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
ad19d17bd6f1e1exeexeexeex.exe
-
Size
940KB
-
MD5
ad19d17bd6f1e1e53ca3b2d6c43cdc6d
-
SHA1
01fe927c0c0461392d4e123a104f4f38bb7689c8
-
SHA256
701345bc279e284da658da8640e74cc5962ee1bae25a531b2e29b0ce4bb575ff
-
SHA512
822f8fdb2f9b771359165928c6c98e97b9a5a35265a6f67249b6628c18852857162a0bab436478f7c128bae8820febbc36f5ffc7145a61e73245cc4175cc6851
-
SSDEEP
24576:RTMk/HOqYTFj8zmzhqglKZswWARELsYVyjjNQ:RTrHOCCYgKswCnyt
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found -
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\DebugClose.png.exe mMAUkckc.exe File created C:\Users\Admin\Pictures\PushShow.png.exe mMAUkckc.exe File created C:\Users\Admin\Pictures\ResetUninstall.png.exe mMAUkckc.exe File created C:\Users\Admin\Pictures\SelectHide.png.exe mMAUkckc.exe -
Executes dropped EXE 2 IoCs
pid Process 980 mMAUkckc.exe 1980 JYUEEMsU.exe -
Loads dropped DLL 20 IoCs
pid Process 2400 ad19d17bd6f1e1exeexeexeex.exe 2400 ad19d17bd6f1e1exeexeexeex.exe 2400 ad19d17bd6f1e1exeexeexeex.exe 2400 ad19d17bd6f1e1exeexeexeex.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe 980 mMAUkckc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JYUEEMsU.exe = "C:\\ProgramData\\TIUcYksM\\JYUEEMsU.exe" JYUEEMsU.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Run\MQYMMIYc.exe = "C:\\Users\\Admin\\xwIYEIQA\\MQYMMIYc.exe" ad19d17bd6f1e1exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TMkoocoA.exe = "C:\\ProgramData\\CyEQIQAs\\TMkoocoA.exe" ad19d17bd6f1e1exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Run\mMAUkckc.exe = "C:\\Users\\Admin\\ICQIUkgA\\mMAUkckc.exe" ad19d17bd6f1e1exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JYUEEMsU.exe = "C:\\ProgramData\\TIUcYksM\\JYUEEMsU.exe" ad19d17bd6f1e1exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Run\mMAUkckc.exe = "C:\\Users\\Admin\\ICQIUkgA\\mMAUkckc.exe" mMAUkckc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico mMAUkckc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 292 2808 WerFault.exe 1543 2736 1168 WerFault.exe 1545 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1308 reg.exe 3024 reg.exe 1584 reg.exe 2000 reg.exe 2404 reg.exe 3008 Process not Found 1740 reg.exe 2956 reg.exe 2672 reg.exe 2780 reg.exe 1536 reg.exe 1740 reg.exe 1124 reg.exe 2396 reg.exe 616 reg.exe 1984 reg.exe 2664 reg.exe 1104 reg.exe 1028 reg.exe 1524 reg.exe 1000 reg.exe 2524 reg.exe 1592 reg.exe 2536 Process not Found 2628 reg.exe 1168 reg.exe 2088 reg.exe 1864 reg.exe 2632 reg.exe 2908 reg.exe 2424 reg.exe 1556 reg.exe 520 reg.exe 1460 reg.exe 1040 reg.exe 1384 reg.exe 1048 reg.exe 2104 reg.exe 2480 reg.exe 2908 reg.exe 2612 reg.exe 1344 Process not Found 1336 Process not Found 2032 reg.exe 2220 reg.exe 2080 reg.exe 816 reg.exe 2876 reg.exe 716 reg.exe 1696 reg.exe 952 reg.exe 2800 reg.exe 3060 reg.exe 1752 reg.exe 2524 Process not Found 1204 reg.exe 1636 reg.exe 2436 reg.exe 3060 reg.exe 2988 reg.exe 1028 reg.exe 2444 reg.exe 2804 reg.exe 2628 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2400 ad19d17bd6f1e1exeexeexeex.exe 2400 ad19d17bd6f1e1exeexeexeex.exe 268 ad19d17bd6f1e1exeexeexeex.exe 268 ad19d17bd6f1e1exeexeexeex.exe 2740 ad19d17bd6f1e1exeexeexeex.exe 2740 ad19d17bd6f1e1exeexeexeex.exe 2232 ad19d17bd6f1e1exeexeexeex.exe 2232 ad19d17bd6f1e1exeexeexeex.exe 480 ad19d17bd6f1e1exeexeexeex.exe 480 ad19d17bd6f1e1exeexeexeex.exe 2116 ad19d17bd6f1e1exeexeexeex.exe 2116 ad19d17bd6f1e1exeexeexeex.exe 2064 ad19d17bd6f1e1exeexeexeex.exe 2064 ad19d17bd6f1e1exeexeexeex.exe 2912 ad19d17bd6f1e1exeexeexeex.exe 2912 ad19d17bd6f1e1exeexeexeex.exe 928 ad19d17bd6f1e1exeexeexeex.exe 928 ad19d17bd6f1e1exeexeexeex.exe 2532 ad19d17bd6f1e1exeexeexeex.exe 2532 ad19d17bd6f1e1exeexeexeex.exe 2876 ad19d17bd6f1e1exeexeexeex.exe 2876 ad19d17bd6f1e1exeexeexeex.exe 1232 ad19d17bd6f1e1exeexeexeex.exe 1232 ad19d17bd6f1e1exeexeexeex.exe 1704 ad19d17bd6f1e1exeexeexeex.exe 1704 ad19d17bd6f1e1exeexeexeex.exe 1604 ad19d17bd6f1e1exeexeexeex.exe 1604 ad19d17bd6f1e1exeexeexeex.exe 3000 ad19d17bd6f1e1exeexeexeex.exe 3000 ad19d17bd6f1e1exeexeexeex.exe 2524 ad19d17bd6f1e1exeexeexeex.exe 2524 ad19d17bd6f1e1exeexeexeex.exe 2916 ad19d17bd6f1e1exeexeexeex.exe 2916 ad19d17bd6f1e1exeexeexeex.exe 1168 ad19d17bd6f1e1exeexeexeex.exe 1168 ad19d17bd6f1e1exeexeexeex.exe 1972 ad19d17bd6f1e1exeexeexeex.exe 1972 ad19d17bd6f1e1exeexeexeex.exe 1556 ad19d17bd6f1e1exeexeexeex.exe 1556 ad19d17bd6f1e1exeexeexeex.exe 1712 ad19d17bd6f1e1exeexeexeex.exe 1712 ad19d17bd6f1e1exeexeexeex.exe 2712 ad19d17bd6f1e1exeexeexeex.exe 2712 ad19d17bd6f1e1exeexeexeex.exe 2496 ad19d17bd6f1e1exeexeexeex.exe 2496 ad19d17bd6f1e1exeexeexeex.exe 1728 ad19d17bd6f1e1exeexeexeex.exe 1728 ad19d17bd6f1e1exeexeexeex.exe 2452 ad19d17bd6f1e1exeexeexeex.exe 2452 ad19d17bd6f1e1exeexeexeex.exe 2240 ad19d17bd6f1e1exeexeexeex.exe 2240 ad19d17bd6f1e1exeexeexeex.exe 2528 ad19d17bd6f1e1exeexeexeex.exe 2528 ad19d17bd6f1e1exeexeexeex.exe 2492 ad19d17bd6f1e1exeexeexeex.exe 2492 ad19d17bd6f1e1exeexeexeex.exe 2944 ad19d17bd6f1e1exeexeexeex.exe 2944 ad19d17bd6f1e1exeexeexeex.exe 2444 ad19d17bd6f1e1exeexeexeex.exe 2444 ad19d17bd6f1e1exeexeexeex.exe 2596 ad19d17bd6f1e1exeexeexeex.exe 2596 ad19d17bd6f1e1exeexeexeex.exe 2568 ad19d17bd6f1e1exeexeexeex.exe 2568 ad19d17bd6f1e1exeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 980 2400 ad19d17bd6f1e1exeexeexeex.exe 28 PID 2400 wrote to memory of 980 2400 ad19d17bd6f1e1exeexeexeex.exe 28 PID 2400 wrote to memory of 980 2400 ad19d17bd6f1e1exeexeexeex.exe 28 PID 2400 wrote to memory of 980 2400 ad19d17bd6f1e1exeexeexeex.exe 28 PID 2400 wrote to memory of 1980 2400 ad19d17bd6f1e1exeexeexeex.exe 29 PID 2400 wrote to memory of 1980 2400 ad19d17bd6f1e1exeexeexeex.exe 29 PID 2400 wrote to memory of 1980 2400 ad19d17bd6f1e1exeexeexeex.exe 29 PID 2400 wrote to memory of 1980 2400 ad19d17bd6f1e1exeexeexeex.exe 29 PID 2400 wrote to memory of 648 2400 ad19d17bd6f1e1exeexeexeex.exe 30 PID 2400 wrote to memory of 648 2400 ad19d17bd6f1e1exeexeexeex.exe 30 PID 2400 wrote to memory of 648 2400 ad19d17bd6f1e1exeexeexeex.exe 30 PID 2400 wrote to memory of 648 2400 ad19d17bd6f1e1exeexeexeex.exe 30 PID 648 wrote to memory of 268 648 cmd.exe 32 PID 648 wrote to memory of 268 648 cmd.exe 32 PID 648 wrote to memory of 268 648 cmd.exe 32 PID 648 wrote to memory of 268 648 cmd.exe 32 PID 2400 wrote to memory of 1996 2400 ad19d17bd6f1e1exeexeexeex.exe 33 PID 2400 wrote to memory of 1996 2400 ad19d17bd6f1e1exeexeexeex.exe 33 PID 2400 wrote to memory of 1996 2400 ad19d17bd6f1e1exeexeexeex.exe 33 PID 2400 wrote to memory of 1996 2400 ad19d17bd6f1e1exeexeexeex.exe 33 PID 2400 wrote to memory of 2000 2400 ad19d17bd6f1e1exeexeexeex.exe 34 PID 2400 wrote to memory of 2000 2400 ad19d17bd6f1e1exeexeexeex.exe 34 PID 2400 wrote to memory of 2000 2400 ad19d17bd6f1e1exeexeexeex.exe 34 PID 2400 wrote to memory of 2000 2400 ad19d17bd6f1e1exeexeexeex.exe 34 PID 2400 wrote to memory of 2952 2400 ad19d17bd6f1e1exeexeexeex.exe 35 PID 2400 wrote to memory of 2952 2400 ad19d17bd6f1e1exeexeexeex.exe 35 PID 2400 wrote to memory of 2952 2400 ad19d17bd6f1e1exeexeexeex.exe 35 PID 2400 wrote to memory of 2952 2400 ad19d17bd6f1e1exeexeexeex.exe 35 PID 2400 wrote to memory of 3044 2400 ad19d17bd6f1e1exeexeexeex.exe 37 PID 2400 wrote to memory of 3044 2400 ad19d17bd6f1e1exeexeexeex.exe 37 PID 2400 wrote to memory of 3044 2400 ad19d17bd6f1e1exeexeexeex.exe 37 PID 2400 wrote to memory of 3044 2400 ad19d17bd6f1e1exeexeexeex.exe 37 PID 3044 wrote to memory of 1724 3044 cmd.exe 41 PID 3044 wrote to memory of 1724 3044 cmd.exe 41 PID 3044 wrote to memory of 1724 3044 cmd.exe 41 PID 3044 wrote to memory of 1724 3044 cmd.exe 41 PID 268 wrote to memory of 2412 268 ad19d17bd6f1e1exeexeexeex.exe 42 PID 268 wrote to memory of 2412 268 ad19d17bd6f1e1exeexeexeex.exe 42 PID 268 wrote to memory of 2412 268 ad19d17bd6f1e1exeexeexeex.exe 42 PID 268 wrote to memory of 2412 268 ad19d17bd6f1e1exeexeexeex.exe 42 PID 2412 wrote to memory of 2740 2412 cmd.exe 44 PID 2412 wrote to memory of 2740 2412 cmd.exe 44 PID 2412 wrote to memory of 2740 2412 cmd.exe 44 PID 2412 wrote to memory of 2740 2412 cmd.exe 44 PID 268 wrote to memory of 2788 268 ad19d17bd6f1e1exeexeexeex.exe 45 PID 268 wrote to memory of 2788 268 ad19d17bd6f1e1exeexeexeex.exe 45 PID 268 wrote to memory of 2788 268 ad19d17bd6f1e1exeexeexeex.exe 45 PID 268 wrote to memory of 2788 268 ad19d17bd6f1e1exeexeexeex.exe 45 PID 268 wrote to memory of 2736 268 ad19d17bd6f1e1exeexeexeex.exe 46 PID 268 wrote to memory of 2736 268 ad19d17bd6f1e1exeexeexeex.exe 46 PID 268 wrote to memory of 2736 268 ad19d17bd6f1e1exeexeexeex.exe 46 PID 268 wrote to memory of 2736 268 ad19d17bd6f1e1exeexeexeex.exe 46 PID 268 wrote to memory of 2628 268 ad19d17bd6f1e1exeexeexeex.exe 52 PID 268 wrote to memory of 2628 268 ad19d17bd6f1e1exeexeexeex.exe 52 PID 268 wrote to memory of 2628 268 ad19d17bd6f1e1exeexeexeex.exe 52 PID 268 wrote to memory of 2628 268 ad19d17bd6f1e1exeexeexeex.exe 52 PID 268 wrote to memory of 2964 268 ad19d17bd6f1e1exeexeexeex.exe 48 PID 268 wrote to memory of 2964 268 ad19d17bd6f1e1exeexeexeex.exe 48 PID 268 wrote to memory of 2964 268 ad19d17bd6f1e1exeexeexeex.exe 48 PID 268 wrote to memory of 2964 268 ad19d17bd6f1e1exeexeexeex.exe 48 PID 2964 wrote to memory of 932 2964 cmd.exe 53 PID 2964 wrote to memory of 932 2964 cmd.exe 53 PID 2964 wrote to memory of 932 2964 cmd.exe 53 PID 2964 wrote to memory of 932 2964 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\ICQIUkgA\mMAUkckc.exe"C:\Users\Admin\ICQIUkgA\mMAUkckc.exe"2⤵
- Modifies extensions of user files
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
PID:980
-
-
C:\ProgramData\TIUcYksM\JYUEEMsU.exe"C:\ProgramData\TIUcYksM\JYUEEMsU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1980
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"6⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"8⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"10⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"12⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"14⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"16⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"18⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"20⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"22⤵PID:480
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"24⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"26⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"28⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"30⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"32⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"34⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"36⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"38⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"40⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"42⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"44⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"46⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"48⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"50⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"52⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"54⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"56⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"58⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"60⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"62⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"64⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex65⤵PID:2732
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"66⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex67⤵PID:1588
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"68⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex69⤵PID:940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"70⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex71⤵PID:2580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"72⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex73⤵PID:2808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"74⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex75⤵PID:1680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"76⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex77⤵PID:2496
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"78⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex79⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"80⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex81⤵PID:2744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"82⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex83⤵PID:2700
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"84⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex85⤵PID:2680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"86⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex87⤵PID:1088
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"88⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex89⤵PID:1464
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"90⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex91⤵PID:2152
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"92⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex93⤵PID:1692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"94⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex95⤵PID:2868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"96⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex97⤵PID:1880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"98⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex99⤵PID:1052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"100⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex101⤵PID:1712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"102⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex103⤵PID:2584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"104⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex105⤵PID:964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"106⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex107⤵PID:1184
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"108⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex109⤵PID:1748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"110⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex111⤵PID:2664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"112⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex113⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"114⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex115⤵PID:2152
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"116⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex117⤵PID:2656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"118⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex119⤵PID:808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"120⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex121⤵PID:2764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad19d17bd6f1e1exeexeexeex"122⤵PID:2808
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-