Analysis
-
max time kernel
150s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
bee6fd7bdb00a9exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
bee6fd7bdb00a9exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
bee6fd7bdb00a9exeexeexeex.exe
-
Size
184KB
-
MD5
bee6fd7bdb00a9a88d175b576d730381
-
SHA1
e5d20ca3d02dcfdddb56e9e3aca913d242a8a810
-
SHA256
4b61b149fc6494e0c2bb320a4ff82b78ffc3193bf140a5f64c9333e4977c187c
-
SHA512
d31d48a954fe97a71d2263a11fb663d7edad2f8f7691c65d8054603b0e0dc6d36924ed9387b8409dd2640166ea07613c02f8faa24aab26708102994ce8841d7c
-
SSDEEP
3072:gjnqqszyDzBvC6va7EU3QWVssm3ojxFHRNzEMMuDCnlgLqNnrnCfpq8ajuIFTDmF:mVFzE6yH3QefFHRRLOnPNOgJH8
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\JoinUninstall.png.exe sYgowQQA.exe File created C:\Users\Admin\Pictures\SuspendMerge.png.exe sYgowQQA.exe -
Executes dropped EXE 2 IoCs
pid Process 2688 sYgowQQA.exe 2288 QUoEMQIo.exe -
Loads dropped DLL 20 IoCs
pid Process 2312 bee6fd7bdb00a9exeexeexeex.exe 2312 bee6fd7bdb00a9exeexeexeex.exe 2312 bee6fd7bdb00a9exeexeexeex.exe 2312 bee6fd7bdb00a9exeexeexeex.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe 2688 sYgowQQA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QUoEMQIo.exe = "C:\\ProgramData\\ZIUEosYc\\QUoEMQIo.exe" bee6fd7bdb00a9exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Run\sYgowQQA.exe = "C:\\Users\\Admin\\AYAQYssY\\sYgowQQA.exe" sYgowQQA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QUoEMQIo.exe = "C:\\ProgramData\\ZIUEosYc\\QUoEMQIo.exe" QUoEMQIo.exe Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\Run\sYgowQQA.exe = "C:\\Users\\Admin\\AYAQYssY\\sYgowQQA.exe" bee6fd7bdb00a9exeexeexeex.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico sYgowQQA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2772 reg.exe 1068 reg.exe 2480 reg.exe 3052 reg.exe 2480 reg.exe 2872 reg.exe 2212 reg.exe 1968 reg.exe 1092 reg.exe 2264 reg.exe 2420 reg.exe 2640 Process not Found 876 reg.exe 2304 reg.exe 2028 reg.exe 2480 reg.exe 1424 reg.exe 2860 reg.exe 1788 reg.exe 1628 reg.exe 2716 reg.exe 2636 reg.exe 2584 reg.exe 2640 reg.exe 2184 reg.exe 2948 reg.exe 1424 reg.exe 2456 reg.exe 2384 reg.exe 2616 reg.exe 2480 Process not Found 2212 reg.exe 924 reg.exe 384 reg.exe 2696 reg.exe 2084 reg.exe 2056 reg.exe 2192 reg.exe 2136 reg.exe 2660 reg.exe 3060 reg.exe 2524 reg.exe 2800 reg.exe 1872 reg.exe 1400 reg.exe 2104 reg.exe 1480 reg.exe 2496 reg.exe 2552 reg.exe 1424 reg.exe 1340 reg.exe 2372 reg.exe 2500 reg.exe 2864 reg.exe 1068 reg.exe 1340 reg.exe 2584 Process not Found 860 reg.exe 2204 reg.exe 960 reg.exe 2968 reg.exe 2796 reg.exe 844 reg.exe 2596 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2312 bee6fd7bdb00a9exeexeexeex.exe 2312 bee6fd7bdb00a9exeexeexeex.exe 2272 bee6fd7bdb00a9exeexeexeex.exe 2272 bee6fd7bdb00a9exeexeexeex.exe 2164 bee6fd7bdb00a9exeexeexeex.exe 2164 bee6fd7bdb00a9exeexeexeex.exe 2488 bee6fd7bdb00a9exeexeexeex.exe 2488 bee6fd7bdb00a9exeexeexeex.exe 1976 bee6fd7bdb00a9exeexeexeex.exe 1976 bee6fd7bdb00a9exeexeexeex.exe 2880 bee6fd7bdb00a9exeexeexeex.exe 2880 bee6fd7bdb00a9exeexeexeex.exe 1488 bee6fd7bdb00a9exeexeexeex.exe 1488 bee6fd7bdb00a9exeexeexeex.exe 2312 bee6fd7bdb00a9exeexeexeex.exe 2312 bee6fd7bdb00a9exeexeexeex.exe 2740 bee6fd7bdb00a9exeexeexeex.exe 2740 bee6fd7bdb00a9exeexeexeex.exe 2484 bee6fd7bdb00a9exeexeexeex.exe 2484 bee6fd7bdb00a9exeexeexeex.exe 2788 bee6fd7bdb00a9exeexeexeex.exe 2788 bee6fd7bdb00a9exeexeexeex.exe 1072 bee6fd7bdb00a9exeexeexeex.exe 1072 bee6fd7bdb00a9exeexeexeex.exe 1628 bee6fd7bdb00a9exeexeexeex.exe 1628 bee6fd7bdb00a9exeexeexeex.exe 2904 bee6fd7bdb00a9exeexeexeex.exe 2904 bee6fd7bdb00a9exeexeexeex.exe 2616 bee6fd7bdb00a9exeexeexeex.exe 2616 bee6fd7bdb00a9exeexeexeex.exe 1916 bee6fd7bdb00a9exeexeexeex.exe 1916 bee6fd7bdb00a9exeexeexeex.exe 2988 bee6fd7bdb00a9exeexeexeex.exe 2988 bee6fd7bdb00a9exeexeexeex.exe 2424 bee6fd7bdb00a9exeexeexeex.exe 2424 bee6fd7bdb00a9exeexeexeex.exe 696 bee6fd7bdb00a9exeexeexeex.exe 696 bee6fd7bdb00a9exeexeexeex.exe 1628 bee6fd7bdb00a9exeexeexeex.exe 1628 bee6fd7bdb00a9exeexeexeex.exe 2324 bee6fd7bdb00a9exeexeexeex.exe 2324 bee6fd7bdb00a9exeexeexeex.exe 2560 bee6fd7bdb00a9exeexeexeex.exe 2560 bee6fd7bdb00a9exeexeexeex.exe 2804 bee6fd7bdb00a9exeexeexeex.exe 2804 bee6fd7bdb00a9exeexeexeex.exe 1128 bee6fd7bdb00a9exeexeexeex.exe 1128 bee6fd7bdb00a9exeexeexeex.exe 2768 bee6fd7bdb00a9exeexeexeex.exe 2768 bee6fd7bdb00a9exeexeexeex.exe 268 bee6fd7bdb00a9exeexeexeex.exe 268 bee6fd7bdb00a9exeexeexeex.exe 2588 bee6fd7bdb00a9exeexeexeex.exe 2588 bee6fd7bdb00a9exeexeexeex.exe 2560 bee6fd7bdb00a9exeexeexeex.exe 2560 bee6fd7bdb00a9exeexeexeex.exe 2132 bee6fd7bdb00a9exeexeexeex.exe 2132 bee6fd7bdb00a9exeexeexeex.exe 1132 bee6fd7bdb00a9exeexeexeex.exe 1132 bee6fd7bdb00a9exeexeexeex.exe 1600 bee6fd7bdb00a9exeexeexeex.exe 1600 bee6fd7bdb00a9exeexeexeex.exe 1204 bee6fd7bdb00a9exeexeexeex.exe 1204 bee6fd7bdb00a9exeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2688 2312 bee6fd7bdb00a9exeexeexeex.exe 29 PID 2312 wrote to memory of 2688 2312 bee6fd7bdb00a9exeexeexeex.exe 29 PID 2312 wrote to memory of 2688 2312 bee6fd7bdb00a9exeexeexeex.exe 29 PID 2312 wrote to memory of 2688 2312 bee6fd7bdb00a9exeexeexeex.exe 29 PID 2312 wrote to memory of 2288 2312 bee6fd7bdb00a9exeexeexeex.exe 30 PID 2312 wrote to memory of 2288 2312 bee6fd7bdb00a9exeexeexeex.exe 30 PID 2312 wrote to memory of 2288 2312 bee6fd7bdb00a9exeexeexeex.exe 30 PID 2312 wrote to memory of 2288 2312 bee6fd7bdb00a9exeexeexeex.exe 30 PID 2312 wrote to memory of 656 2312 bee6fd7bdb00a9exeexeexeex.exe 32 PID 2312 wrote to memory of 656 2312 bee6fd7bdb00a9exeexeexeex.exe 32 PID 2312 wrote to memory of 656 2312 bee6fd7bdb00a9exeexeexeex.exe 32 PID 2312 wrote to memory of 656 2312 bee6fd7bdb00a9exeexeexeex.exe 32 PID 656 wrote to memory of 2272 656 cmd.exe 33 PID 656 wrote to memory of 2272 656 cmd.exe 33 PID 656 wrote to memory of 2272 656 cmd.exe 33 PID 656 wrote to memory of 2272 656 cmd.exe 33 PID 2312 wrote to memory of 2204 2312 bee6fd7bdb00a9exeexeexeex.exe 34 PID 2312 wrote to memory of 2204 2312 bee6fd7bdb00a9exeexeexeex.exe 34 PID 2312 wrote to memory of 2204 2312 bee6fd7bdb00a9exeexeexeex.exe 34 PID 2312 wrote to memory of 2204 2312 bee6fd7bdb00a9exeexeexeex.exe 34 PID 2312 wrote to memory of 2948 2312 bee6fd7bdb00a9exeexeexeex.exe 35 PID 2312 wrote to memory of 2948 2312 bee6fd7bdb00a9exeexeexeex.exe 35 PID 2312 wrote to memory of 2948 2312 bee6fd7bdb00a9exeexeexeex.exe 35 PID 2312 wrote to memory of 2948 2312 bee6fd7bdb00a9exeexeexeex.exe 35 PID 2312 wrote to memory of 2960 2312 bee6fd7bdb00a9exeexeexeex.exe 37 PID 2312 wrote to memory of 2960 2312 bee6fd7bdb00a9exeexeexeex.exe 37 PID 2312 wrote to memory of 2960 2312 bee6fd7bdb00a9exeexeexeex.exe 37 PID 2312 wrote to memory of 2960 2312 bee6fd7bdb00a9exeexeexeex.exe 37 PID 2312 wrote to memory of 1540 2312 bee6fd7bdb00a9exeexeexeex.exe 38 PID 2312 wrote to memory of 1540 2312 bee6fd7bdb00a9exeexeexeex.exe 38 PID 2312 wrote to memory of 1540 2312 bee6fd7bdb00a9exeexeexeex.exe 38 PID 2312 wrote to memory of 1540 2312 bee6fd7bdb00a9exeexeexeex.exe 38 PID 1540 wrote to memory of 1648 1540 cmd.exe 42 PID 1540 wrote to memory of 1648 1540 cmd.exe 42 PID 1540 wrote to memory of 1648 1540 cmd.exe 42 PID 1540 wrote to memory of 1648 1540 cmd.exe 42 PID 2272 wrote to memory of 3048 2272 bee6fd7bdb00a9exeexeexeex.exe 43 PID 2272 wrote to memory of 3048 2272 bee6fd7bdb00a9exeexeexeex.exe 43 PID 2272 wrote to memory of 3048 2272 bee6fd7bdb00a9exeexeexeex.exe 43 PID 2272 wrote to memory of 3048 2272 bee6fd7bdb00a9exeexeexeex.exe 43 PID 3048 wrote to memory of 2164 3048 cmd.exe 45 PID 3048 wrote to memory of 2164 3048 cmd.exe 45 PID 3048 wrote to memory of 2164 3048 cmd.exe 45 PID 3048 wrote to memory of 2164 3048 cmd.exe 45 PID 2272 wrote to memory of 2608 2272 bee6fd7bdb00a9exeexeexeex.exe 46 PID 2272 wrote to memory of 2608 2272 bee6fd7bdb00a9exeexeexeex.exe 46 PID 2272 wrote to memory of 2608 2272 bee6fd7bdb00a9exeexeexeex.exe 46 PID 2272 wrote to memory of 2608 2272 bee6fd7bdb00a9exeexeexeex.exe 46 PID 2272 wrote to memory of 2616 2272 bee6fd7bdb00a9exeexeexeex.exe 53 PID 2272 wrote to memory of 2616 2272 bee6fd7bdb00a9exeexeexeex.exe 53 PID 2272 wrote to memory of 2616 2272 bee6fd7bdb00a9exeexeexeex.exe 53 PID 2272 wrote to memory of 2616 2272 bee6fd7bdb00a9exeexeexeex.exe 53 PID 2272 wrote to memory of 2676 2272 bee6fd7bdb00a9exeexeexeex.exe 47 PID 2272 wrote to memory of 2676 2272 bee6fd7bdb00a9exeexeexeex.exe 47 PID 2272 wrote to memory of 2676 2272 bee6fd7bdb00a9exeexeexeex.exe 47 PID 2272 wrote to memory of 2676 2272 bee6fd7bdb00a9exeexeexeex.exe 47 PID 2272 wrote to memory of 2596 2272 bee6fd7bdb00a9exeexeexeex.exe 51 PID 2272 wrote to memory of 2596 2272 bee6fd7bdb00a9exeexeexeex.exe 51 PID 2272 wrote to memory of 2596 2272 bee6fd7bdb00a9exeexeexeex.exe 51 PID 2272 wrote to memory of 2596 2272 bee6fd7bdb00a9exeexeexeex.exe 51 PID 2596 wrote to memory of 2584 2596 cmd.exe 54 PID 2596 wrote to memory of 2584 2596 cmd.exe 54 PID 2596 wrote to memory of 2584 2596 cmd.exe 54 PID 2596 wrote to memory of 2584 2596 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AYAQYssY\sYgowQQA.exe"C:\Users\Admin\AYAQYssY\sYgowQQA.exe"2⤵
- Modifies extensions of user files
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
PID:2688
-
-
C:\ProgramData\ZIUEosYc\QUoEMQIo.exe"C:\ProgramData\ZIUEosYc\QUoEMQIo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2288
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"6⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"8⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"10⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"12⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"14⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"16⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"18⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"20⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"22⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1072 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"24⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"26⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"28⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"30⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"32⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"34⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"36⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"38⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"40⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"42⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"44⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"46⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"48⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"50⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"52⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2588 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"54⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"56⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"58⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"60⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"62⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"64⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex65⤵PID:656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"66⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex67⤵PID:1180
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"68⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex69⤵PID:808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"70⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex71⤵PID:2244
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"72⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex73⤵PID:520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"74⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex75⤵PID:2352
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"76⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex77⤵PID:656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"78⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex79⤵PID:2248
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"80⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex81⤵PID:1596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"82⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex83⤵PID:1936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"84⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex85⤵PID:2180
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"86⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex87⤵PID:2352
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"88⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex89⤵PID:2204
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"90⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex91⤵PID:2620
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"92⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex93⤵PID:2640
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"94⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex95⤵PID:1188
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"96⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex97⤵PID:828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"98⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex99⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"100⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex101⤵PID:2652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"102⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex103⤵PID:2868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"104⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex105⤵PID:1768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"106⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex107⤵PID:1496
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"108⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex109⤵PID:1360
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"110⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex111⤵PID:2312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"112⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex113⤵PID:2476
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"114⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex115⤵PID:1424
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"116⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex117⤵PID:2808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"118⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex119⤵PID:3016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"120⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex121⤵PID:2072
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bee6fd7bdb00a9exeexeexeex"122⤵PID:2160
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-