Analysis
-
max time kernel
150s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
becf2cfb41d78dexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
becf2cfb41d78dexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
becf2cfb41d78dexeexeexeex.exe
-
Size
200KB
-
MD5
becf2cfb41d78df0b5ebe54c11498eb5
-
SHA1
6401e8cea4f9ed8a67ccf262776b1f814d2e870e
-
SHA256
66386489d7232fe00e3e1c4c4840db85b2b3535002029911fb48cb1b1d844b95
-
SHA512
cdd9a8d5ea50edf769eb6e645930fec175b8ee82c215d70c899a8d0fd157b63b1be59b17decc97d39320f2da4133183ec039b238efc920b201fcfe87cd974965
-
SSDEEP
3072:GO9uxAQx4MPd3QkSGQnkHWR1fYA3/cZ2YJM6Ogpm+pRE/Osc2d:vuxAUQnk2xcF/Joxr1d
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Control Panel\International\Geo\Nation neIQgcsU.exe -
Deletes itself 1 IoCs
pid Process 2676 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2272 neIQgcsU.exe 888 CiEUUYgM.exe -
Loads dropped DLL 20 IoCs
pid Process 296 becf2cfb41d78dexeexeexeex.exe 296 becf2cfb41d78dexeexeexeex.exe 296 becf2cfb41d78dexeexeexeex.exe 296 becf2cfb41d78dexeexeexeex.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CiEUUYgM.exe = "C:\\ProgramData\\UowMEcYU\\CiEUUYgM.exe" becf2cfb41d78dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Run\neIQgcsU.exe = "C:\\Users\\Admin\\TeIUcwEI\\neIQgcsU.exe" neIQgcsU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CiEUUYgM.exe = "C:\\ProgramData\\UowMEcYU\\CiEUUYgM.exe" CiEUUYgM.exe Set value (str) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Windows\CurrentVersion\Run\neIQgcsU.exe = "C:\\Users\\Admin\\TeIUcwEI\\neIQgcsU.exe" becf2cfb41d78dexeexeexeex.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico neIQgcsU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2292 reg.exe 1004 reg.exe 1992 reg.exe 432 reg.exe 1180 reg.exe 1508 reg.exe 1920 reg.exe 1380 reg.exe 2480 reg.exe 1656 reg.exe 2296 reg.exe 1896 reg.exe 428 reg.exe 2040 reg.exe 2604 reg.exe 1144 reg.exe 2644 reg.exe 2644 reg.exe 2840 reg.exe 1584 reg.exe 1580 reg.exe 1180 reg.exe 2720 reg.exe 3052 reg.exe 1196 reg.exe 660 reg.exe 1288 reg.exe 1984 reg.exe 2320 reg.exe 1568 reg.exe 2548 reg.exe 2928 reg.exe 1212 Process not Found 2452 reg.exe 2724 reg.exe 3032 reg.exe 1180 reg.exe 2748 reg.exe 2232 reg.exe 2860 reg.exe 1436 reg.exe 1204 reg.exe 2704 reg.exe 1348 reg.exe 1204 reg.exe 432 reg.exe 2600 reg.exe 2028 reg.exe 2344 reg.exe 2296 reg.exe 1616 reg.exe 1748 reg.exe 2032 Process not Found 2444 reg.exe 2964 reg.exe 1828 reg.exe 3020 reg.exe 1832 reg.exe 1560 Process not Found 1952 reg.exe 2024 reg.exe 2256 reg.exe 2688 reg.exe 1960 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 296 becf2cfb41d78dexeexeexeex.exe 296 becf2cfb41d78dexeexeexeex.exe 884 becf2cfb41d78dexeexeexeex.exe 884 becf2cfb41d78dexeexeexeex.exe 432 becf2cfb41d78dexeexeexeex.exe 432 becf2cfb41d78dexeexeexeex.exe 2752 becf2cfb41d78dexeexeexeex.exe 2752 becf2cfb41d78dexeexeexeex.exe 2812 becf2cfb41d78dexeexeexeex.exe 2812 becf2cfb41d78dexeexeexeex.exe 2332 becf2cfb41d78dexeexeexeex.exe 2332 becf2cfb41d78dexeexeexeex.exe 612 becf2cfb41d78dexeexeexeex.exe 612 becf2cfb41d78dexeexeexeex.exe 1964 becf2cfb41d78dexeexeexeex.exe 1964 becf2cfb41d78dexeexeexeex.exe 2576 becf2cfb41d78dexeexeexeex.exe 2576 becf2cfb41d78dexeexeexeex.exe 1592 becf2cfb41d78dexeexeexeex.exe 1592 becf2cfb41d78dexeexeexeex.exe 1764 becf2cfb41d78dexeexeexeex.exe 1764 becf2cfb41d78dexeexeexeex.exe 2896 becf2cfb41d78dexeexeexeex.exe 2896 becf2cfb41d78dexeexeexeex.exe 2088 becf2cfb41d78dexeexeexeex.exe 2088 becf2cfb41d78dexeexeexeex.exe 2232 becf2cfb41d78dexeexeexeex.exe 2232 becf2cfb41d78dexeexeexeex.exe 1468 becf2cfb41d78dexeexeexeex.exe 1468 becf2cfb41d78dexeexeexeex.exe 2372 becf2cfb41d78dexeexeexeex.exe 2372 becf2cfb41d78dexeexeexeex.exe 1544 becf2cfb41d78dexeexeexeex.exe 1544 becf2cfb41d78dexeexeexeex.exe 3036 becf2cfb41d78dexeexeexeex.exe 3036 becf2cfb41d78dexeexeexeex.exe 932 becf2cfb41d78dexeexeexeex.exe 932 becf2cfb41d78dexeexeexeex.exe 3000 becf2cfb41d78dexeexeexeex.exe 3000 becf2cfb41d78dexeexeexeex.exe 2996 becf2cfb41d78dexeexeexeex.exe 2996 becf2cfb41d78dexeexeexeex.exe 2940 becf2cfb41d78dexeexeexeex.exe 2940 becf2cfb41d78dexeexeexeex.exe 1592 becf2cfb41d78dexeexeexeex.exe 1592 becf2cfb41d78dexeexeexeex.exe 2116 becf2cfb41d78dexeexeexeex.exe 2116 becf2cfb41d78dexeexeexeex.exe 2812 becf2cfb41d78dexeexeexeex.exe 2812 becf2cfb41d78dexeexeexeex.exe 2120 becf2cfb41d78dexeexeexeex.exe 2120 becf2cfb41d78dexeexeexeex.exe 1444 becf2cfb41d78dexeexeexeex.exe 1444 becf2cfb41d78dexeexeexeex.exe 2164 becf2cfb41d78dexeexeexeex.exe 2164 becf2cfb41d78dexeexeexeex.exe 1780 becf2cfb41d78dexeexeexeex.exe 1780 becf2cfb41d78dexeexeexeex.exe 1708 becf2cfb41d78dexeexeexeex.exe 1708 becf2cfb41d78dexeexeexeex.exe 1348 becf2cfb41d78dexeexeexeex.exe 1348 becf2cfb41d78dexeexeexeex.exe 468 becf2cfb41d78dexeexeexeex.exe 468 becf2cfb41d78dexeexeexeex.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe 2272 neIQgcsU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 296 wrote to memory of 2272 296 becf2cfb41d78dexeexeexeex.exe 29 PID 296 wrote to memory of 2272 296 becf2cfb41d78dexeexeexeex.exe 29 PID 296 wrote to memory of 2272 296 becf2cfb41d78dexeexeexeex.exe 29 PID 296 wrote to memory of 2272 296 becf2cfb41d78dexeexeexeex.exe 29 PID 296 wrote to memory of 888 296 becf2cfb41d78dexeexeexeex.exe 30 PID 296 wrote to memory of 888 296 becf2cfb41d78dexeexeexeex.exe 30 PID 296 wrote to memory of 888 296 becf2cfb41d78dexeexeexeex.exe 30 PID 296 wrote to memory of 888 296 becf2cfb41d78dexeexeexeex.exe 30 PID 296 wrote to memory of 1396 296 becf2cfb41d78dexeexeexeex.exe 31 PID 296 wrote to memory of 1396 296 becf2cfb41d78dexeexeexeex.exe 31 PID 296 wrote to memory of 1396 296 becf2cfb41d78dexeexeexeex.exe 31 PID 296 wrote to memory of 1396 296 becf2cfb41d78dexeexeexeex.exe 31 PID 1396 wrote to memory of 884 1396 cmd.exe 33 PID 1396 wrote to memory of 884 1396 cmd.exe 33 PID 1396 wrote to memory of 884 1396 cmd.exe 33 PID 1396 wrote to memory of 884 1396 cmd.exe 33 PID 296 wrote to memory of 2444 296 becf2cfb41d78dexeexeexeex.exe 34 PID 296 wrote to memory of 2444 296 becf2cfb41d78dexeexeexeex.exe 34 PID 296 wrote to memory of 2444 296 becf2cfb41d78dexeexeexeex.exe 34 PID 296 wrote to memory of 2444 296 becf2cfb41d78dexeexeexeex.exe 34 PID 296 wrote to memory of 2324 296 becf2cfb41d78dexeexeexeex.exe 35 PID 296 wrote to memory of 2324 296 becf2cfb41d78dexeexeexeex.exe 35 PID 296 wrote to memory of 2324 296 becf2cfb41d78dexeexeexeex.exe 35 PID 296 wrote to memory of 2324 296 becf2cfb41d78dexeexeexeex.exe 35 PID 296 wrote to memory of 2388 296 becf2cfb41d78dexeexeexeex.exe 37 PID 296 wrote to memory of 2388 296 becf2cfb41d78dexeexeexeex.exe 37 PID 296 wrote to memory of 2388 296 becf2cfb41d78dexeexeexeex.exe 37 PID 296 wrote to memory of 2388 296 becf2cfb41d78dexeexeexeex.exe 37 PID 296 wrote to memory of 3028 296 becf2cfb41d78dexeexeexeex.exe 40 PID 296 wrote to memory of 3028 296 becf2cfb41d78dexeexeexeex.exe 40 PID 296 wrote to memory of 3028 296 becf2cfb41d78dexeexeexeex.exe 40 PID 296 wrote to memory of 3028 296 becf2cfb41d78dexeexeexeex.exe 40 PID 3028 wrote to memory of 1652 3028 cmd.exe 42 PID 3028 wrote to memory of 1652 3028 cmd.exe 42 PID 3028 wrote to memory of 1652 3028 cmd.exe 42 PID 3028 wrote to memory of 1652 3028 cmd.exe 42 PID 884 wrote to memory of 2372 884 becf2cfb41d78dexeexeexeex.exe 43 PID 884 wrote to memory of 2372 884 becf2cfb41d78dexeexeexeex.exe 43 PID 884 wrote to memory of 2372 884 becf2cfb41d78dexeexeexeex.exe 43 PID 884 wrote to memory of 2372 884 becf2cfb41d78dexeexeexeex.exe 43 PID 2372 wrote to memory of 432 2372 cmd.exe 45 PID 2372 wrote to memory of 432 2372 cmd.exe 45 PID 2372 wrote to memory of 432 2372 cmd.exe 45 PID 2372 wrote to memory of 432 2372 cmd.exe 45 PID 884 wrote to memory of 2612 884 becf2cfb41d78dexeexeexeex.exe 46 PID 884 wrote to memory of 2612 884 becf2cfb41d78dexeexeexeex.exe 46 PID 884 wrote to memory of 2612 884 becf2cfb41d78dexeexeexeex.exe 46 PID 884 wrote to memory of 2612 884 becf2cfb41d78dexeexeexeex.exe 46 PID 884 wrote to memory of 2600 884 becf2cfb41d78dexeexeexeex.exe 48 PID 884 wrote to memory of 2600 884 becf2cfb41d78dexeexeexeex.exe 48 PID 884 wrote to memory of 2600 884 becf2cfb41d78dexeexeexeex.exe 48 PID 884 wrote to memory of 2600 884 becf2cfb41d78dexeexeexeex.exe 48 PID 884 wrote to memory of 2708 884 becf2cfb41d78dexeexeexeex.exe 49 PID 884 wrote to memory of 2708 884 becf2cfb41d78dexeexeexeex.exe 49 PID 884 wrote to memory of 2708 884 becf2cfb41d78dexeexeexeex.exe 49 PID 884 wrote to memory of 2708 884 becf2cfb41d78dexeexeexeex.exe 49 PID 884 wrote to memory of 2772 884 becf2cfb41d78dexeexeexeex.exe 51 PID 884 wrote to memory of 2772 884 becf2cfb41d78dexeexeexeex.exe 51 PID 884 wrote to memory of 2772 884 becf2cfb41d78dexeexeexeex.exe 51 PID 884 wrote to memory of 2772 884 becf2cfb41d78dexeexeexeex.exe 51 PID 2772 wrote to memory of 1920 2772 cmd.exe 54 PID 2772 wrote to memory of 1920 2772 cmd.exe 54 PID 2772 wrote to memory of 1920 2772 cmd.exe 54 PID 2772 wrote to memory of 1920 2772 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Users\Admin\TeIUcwEI\neIQgcsU.exe"C:\Users\Admin\TeIUcwEI\neIQgcsU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2272
-
-
C:\ProgramData\UowMEcYU\CiEUUYgM.exe"C:\ProgramData\UowMEcYU\CiEUUYgM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:888
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:432 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"6⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"8⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"10⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"12⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"14⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"16⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"18⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"20⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"22⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"24⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"26⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"28⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"30⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"32⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"34⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"36⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:932 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"38⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"40⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"42⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"44⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"46⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"48⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"50⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"52⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"54⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"56⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"58⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"60⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"62⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"64⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex65⤵PID:2312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"66⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex67⤵PID:2892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"68⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex69⤵PID:2284
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"70⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex71⤵PID:2276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"72⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex73⤵PID:380
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"74⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex75⤵PID:2720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"76⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex77⤵PID:2156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"78⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex79⤵PID:2432
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"80⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex81⤵PID:2404
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"82⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex83⤵PID:1708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"84⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex85⤵PID:1288
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"86⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex87⤵PID:2720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"88⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex89⤵PID:1580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"90⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex91⤵PID:2624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"92⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex93⤵PID:2108
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"94⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex95⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"96⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex97⤵PID:1004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"98⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex99⤵PID:2376
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"100⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex101⤵PID:2920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"102⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex103⤵PID:2796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"104⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex105⤵PID:2384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"106⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex107⤵PID:1060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"108⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex109⤵PID:1440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"110⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex111⤵PID:2388
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"112⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex113⤵PID:1560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"114⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex115⤵PID:2792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"116⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex117⤵PID:612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"118⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex119⤵PID:2600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"120⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex121⤵PID:1380
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\becf2cfb41d78dexeexeexeex"122⤵PID:2404
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-