Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
e30007231a1a3aexeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
e30007231a1a3aexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
e30007231a1a3aexeexeexeex.exe
-
Size
196KB
-
MD5
e30007231a1a3ad41307b1ef1d18dc82
-
SHA1
a4920534487306c2d1b38a388fb48be845f49b13
-
SHA256
c9d0677d01da97f87a8c899d611cdce28387944584e0adaad4ee02a098704458
-
SHA512
a6584052e256fc7dba9ba9e8f8059d95cbfaf6157a4c46fd384fc80d339390f184111123e2c56b8f67ea03824955242759b7a3db45b361bbb059b3e03cb40c8e
-
SSDEEP
6144:eWOGCLU87G+IZ8gTm1iW0x75moGxL1bT4y:UhLlVI8gSk975m91b5
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\SwitchInstall.png.exe lEskwUII.exe File created C:\Users\Admin\Pictures\UnregisterRemove.png.exe lEskwUII.exe File created C:\Users\Admin\Pictures\OpenUnpublish.png.exe lEskwUII.exe -
Executes dropped EXE 2 IoCs
pid Process 2956 lEskwUII.exe 2932 tgwYwMkw.exe -
Loads dropped DLL 20 IoCs
pid Process 2868 e30007231a1a3aexeexeexeex.exe 2868 e30007231a1a3aexeexeexeex.exe 2868 e30007231a1a3aexeexeexeex.exe 2868 e30007231a1a3aexeexeexeex.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe 2956 lEskwUII.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Run\lEskwUII.exe = "C:\\Users\\Admin\\WKkcIAoM\\lEskwUII.exe" e30007231a1a3aexeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\tgwYwMkw.exe = "C:\\ProgramData\\WqIgsEgo\\tgwYwMkw.exe" e30007231a1a3aexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Run\lEskwUII.exe = "C:\\Users\\Admin\\WKkcIAoM\\lEskwUII.exe" lEskwUII.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\tgwYwMkw.exe = "C:\\ProgramData\\WqIgsEgo\\tgwYwMkw.exe" tgwYwMkw.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Run\CsYEEYQQ.exe = "C:\\Users\\Admin\\xCswIIAc\\CsYEEYQQ.exe" e30007231a1a3aexeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vSMUMIUc.exe = "C:\\ProgramData\\jGQcocwE\\vSMUMIUc.exe" e30007231a1a3aexeexeexeex.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico lEskwUII.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1584 1236 WerFault.exe 1531 1620 1684 WerFault.exe 1530 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 812 reg.exe 1756 reg.exe 2476 reg.exe 1708 reg.exe 2560 reg.exe 1292 reg.exe 2644 reg.exe 2888 reg.exe 1972 reg.exe 516 reg.exe 1960 reg.exe 276 Process not Found 2780 reg.exe 1768 reg.exe 188 reg.exe 2648 reg.exe 2396 reg.exe 2868 reg.exe 1712 reg.exe 2484 reg.exe 2444 reg.exe 1560 reg.exe 1468 Process not Found 2380 reg.exe 2380 reg.exe 2672 reg.exe 1040 reg.exe 1040 Process not Found 2544 reg.exe 2364 reg.exe 2076 Process not Found 2400 reg.exe 916 reg.exe 2660 reg.exe 2984 reg.exe 2320 reg.exe 1600 reg.exe 2140 reg.exe 2656 Process not Found 1736 Process not Found 2372 reg.exe 2372 reg.exe 1516 reg.exe 1040 reg.exe 2060 reg.exe 1240 reg.exe 1948 reg.exe 516 reg.exe 2884 reg.exe 2712 reg.exe 2336 reg.exe 2216 reg.exe 1384 reg.exe 1816 reg.exe 2316 reg.exe 988 reg.exe 2532 reg.exe 2524 reg.exe 2876 reg.exe 1316 reg.exe 2480 reg.exe 584 reg.exe 2216 reg.exe 2296 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2868 e30007231a1a3aexeexeexeex.exe 2868 e30007231a1a3aexeexeexeex.exe 2808 e30007231a1a3aexeexeexeex.exe 2808 e30007231a1a3aexeexeexeex.exe 2672 e30007231a1a3aexeexeexeex.exe 2672 e30007231a1a3aexeexeexeex.exe 2508 e30007231a1a3aexeexeexeex.exe 2508 e30007231a1a3aexeexeexeex.exe 1524 e30007231a1a3aexeexeexeex.exe 1524 e30007231a1a3aexeexeexeex.exe 688 e30007231a1a3aexeexeexeex.exe 688 e30007231a1a3aexeexeexeex.exe 1752 e30007231a1a3aexeexeexeex.exe 1752 e30007231a1a3aexeexeexeex.exe 2260 e30007231a1a3aexeexeexeex.exe 2260 e30007231a1a3aexeexeexeex.exe 2452 e30007231a1a3aexeexeexeex.exe 2452 e30007231a1a3aexeexeexeex.exe 2580 e30007231a1a3aexeexeexeex.exe 2580 e30007231a1a3aexeexeexeex.exe 1568 e30007231a1a3aexeexeexeex.exe 1568 e30007231a1a3aexeexeexeex.exe 832 e30007231a1a3aexeexeexeex.exe 832 e30007231a1a3aexeexeexeex.exe 2780 e30007231a1a3aexeexeexeex.exe 2780 e30007231a1a3aexeexeexeex.exe 2684 e30007231a1a3aexeexeexeex.exe 2684 e30007231a1a3aexeexeexeex.exe 2192 e30007231a1a3aexeexeexeex.exe 2192 e30007231a1a3aexeexeexeex.exe 2776 e30007231a1a3aexeexeexeex.exe 2776 e30007231a1a3aexeexeexeex.exe 2544 e30007231a1a3aexeexeexeex.exe 2544 e30007231a1a3aexeexeexeex.exe 584 e30007231a1a3aexeexeexeex.exe 584 e30007231a1a3aexeexeexeex.exe 2892 e30007231a1a3aexeexeexeex.exe 2892 e30007231a1a3aexeexeexeex.exe 1868 e30007231a1a3aexeexeexeex.exe 1868 e30007231a1a3aexeexeexeex.exe 2884 e30007231a1a3aexeexeexeex.exe 2884 e30007231a1a3aexeexeexeex.exe 1428 e30007231a1a3aexeexeexeex.exe 1428 e30007231a1a3aexeexeexeex.exe 792 e30007231a1a3aexeexeexeex.exe 792 e30007231a1a3aexeexeexeex.exe 1368 e30007231a1a3aexeexeexeex.exe 1368 e30007231a1a3aexeexeexeex.exe 2160 e30007231a1a3aexeexeexeex.exe 2160 e30007231a1a3aexeexeexeex.exe 2304 e30007231a1a3aexeexeexeex.exe 2304 e30007231a1a3aexeexeexeex.exe 2836 e30007231a1a3aexeexeexeex.exe 2836 e30007231a1a3aexeexeexeex.exe 2680 e30007231a1a3aexeexeexeex.exe 2680 e30007231a1a3aexeexeexeex.exe 1472 e30007231a1a3aexeexeexeex.exe 1472 e30007231a1a3aexeexeexeex.exe 2648 e30007231a1a3aexeexeexeex.exe 2648 e30007231a1a3aexeexeexeex.exe 2940 e30007231a1a3aexeexeexeex.exe 2940 e30007231a1a3aexeexeexeex.exe 2616 e30007231a1a3aexeexeexeex.exe 2616 e30007231a1a3aexeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2956 2868 e30007231a1a3aexeexeexeex.exe 27 PID 2868 wrote to memory of 2956 2868 e30007231a1a3aexeexeexeex.exe 27 PID 2868 wrote to memory of 2956 2868 e30007231a1a3aexeexeexeex.exe 27 PID 2868 wrote to memory of 2956 2868 e30007231a1a3aexeexeexeex.exe 27 PID 2868 wrote to memory of 2932 2868 e30007231a1a3aexeexeexeex.exe 28 PID 2868 wrote to memory of 2932 2868 e30007231a1a3aexeexeexeex.exe 28 PID 2868 wrote to memory of 2932 2868 e30007231a1a3aexeexeexeex.exe 28 PID 2868 wrote to memory of 2932 2868 e30007231a1a3aexeexeexeex.exe 28 PID 2868 wrote to memory of 2196 2868 e30007231a1a3aexeexeexeex.exe 29 PID 2868 wrote to memory of 2196 2868 e30007231a1a3aexeexeexeex.exe 29 PID 2868 wrote to memory of 2196 2868 e30007231a1a3aexeexeexeex.exe 29 PID 2868 wrote to memory of 2196 2868 e30007231a1a3aexeexeexeex.exe 29 PID 2196 wrote to memory of 2808 2196 cmd.exe 31 PID 2196 wrote to memory of 2808 2196 cmd.exe 31 PID 2196 wrote to memory of 2808 2196 cmd.exe 31 PID 2196 wrote to memory of 2808 2196 cmd.exe 31 PID 2868 wrote to memory of 936 2868 e30007231a1a3aexeexeexeex.exe 32 PID 2868 wrote to memory of 936 2868 e30007231a1a3aexeexeexeex.exe 32 PID 2868 wrote to memory of 936 2868 e30007231a1a3aexeexeexeex.exe 32 PID 2868 wrote to memory of 936 2868 e30007231a1a3aexeexeexeex.exe 32 PID 2868 wrote to memory of 1820 2868 e30007231a1a3aexeexeexeex.exe 33 PID 2868 wrote to memory of 1820 2868 e30007231a1a3aexeexeexeex.exe 33 PID 2868 wrote to memory of 1820 2868 e30007231a1a3aexeexeexeex.exe 33 PID 2868 wrote to memory of 1820 2868 e30007231a1a3aexeexeexeex.exe 33 PID 2868 wrote to memory of 1384 2868 e30007231a1a3aexeexeexeex.exe 35 PID 2868 wrote to memory of 1384 2868 e30007231a1a3aexeexeexeex.exe 35 PID 2868 wrote to memory of 1384 2868 e30007231a1a3aexeexeexeex.exe 35 PID 2868 wrote to memory of 1384 2868 e30007231a1a3aexeexeexeex.exe 35 PID 2868 wrote to memory of 2188 2868 e30007231a1a3aexeexeexeex.exe 36 PID 2868 wrote to memory of 2188 2868 e30007231a1a3aexeexeexeex.exe 36 PID 2868 wrote to memory of 2188 2868 e30007231a1a3aexeexeexeex.exe 36 PID 2868 wrote to memory of 2188 2868 e30007231a1a3aexeexeexeex.exe 36 PID 2808 wrote to memory of 2732 2808 e30007231a1a3aexeexeexeex.exe 41 PID 2808 wrote to memory of 2732 2808 e30007231a1a3aexeexeexeex.exe 41 PID 2808 wrote to memory of 2732 2808 e30007231a1a3aexeexeexeex.exe 41 PID 2808 wrote to memory of 2732 2808 e30007231a1a3aexeexeexeex.exe 41 PID 2732 wrote to memory of 2672 2732 cmd.exe 43 PID 2732 wrote to memory of 2672 2732 cmd.exe 43 PID 2732 wrote to memory of 2672 2732 cmd.exe 43 PID 2732 wrote to memory of 2672 2732 cmd.exe 43 PID 2188 wrote to memory of 2216 2188 cmd.exe 42 PID 2188 wrote to memory of 2216 2188 cmd.exe 42 PID 2188 wrote to memory of 2216 2188 cmd.exe 42 PID 2188 wrote to memory of 2216 2188 cmd.exe 42 PID 2808 wrote to memory of 812 2808 e30007231a1a3aexeexeexeex.exe 44 PID 2808 wrote to memory of 812 2808 e30007231a1a3aexeexeexeex.exe 44 PID 2808 wrote to memory of 812 2808 e30007231a1a3aexeexeexeex.exe 44 PID 2808 wrote to memory of 812 2808 e30007231a1a3aexeexeexeex.exe 44 PID 2808 wrote to memory of 2852 2808 e30007231a1a3aexeexeexeex.exe 49 PID 2808 wrote to memory of 2852 2808 e30007231a1a3aexeexeexeex.exe 49 PID 2808 wrote to memory of 2852 2808 e30007231a1a3aexeexeexeex.exe 49 PID 2808 wrote to memory of 2852 2808 e30007231a1a3aexeexeexeex.exe 49 PID 2808 wrote to memory of 2488 2808 e30007231a1a3aexeexeexeex.exe 48 PID 2808 wrote to memory of 2488 2808 e30007231a1a3aexeexeexeex.exe 48 PID 2808 wrote to memory of 2488 2808 e30007231a1a3aexeexeexeex.exe 48 PID 2808 wrote to memory of 2488 2808 e30007231a1a3aexeexeexeex.exe 48 PID 2808 wrote to memory of 2580 2808 e30007231a1a3aexeexeexeex.exe 47 PID 2808 wrote to memory of 2580 2808 e30007231a1a3aexeexeexeex.exe 47 PID 2808 wrote to memory of 2580 2808 e30007231a1a3aexeexeexeex.exe 47 PID 2808 wrote to memory of 2580 2808 e30007231a1a3aexeexeexeex.exe 47 PID 2580 wrote to memory of 2844 2580 cmd.exe 52 PID 2580 wrote to memory of 2844 2580 cmd.exe 52 PID 2580 wrote to memory of 2844 2580 cmd.exe 52 PID 2580 wrote to memory of 2844 2580 cmd.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\WKkcIAoM\lEskwUII.exe"C:\Users\Admin\WKkcIAoM\lEskwUII.exe"2⤵
- Modifies extensions of user files
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
PID:2956
-
-
C:\ProgramData\WqIgsEgo\tgwYwMkw.exe"C:\ProgramData\WqIgsEgo\tgwYwMkw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2932
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"6⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"8⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"10⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"12⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"14⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"16⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"18⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"20⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"22⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"24⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"26⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"28⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"30⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"32⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"34⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"36⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"38⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"40⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"42⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"44⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"46⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"48⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"50⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"52⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"54⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"56⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"58⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"60⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"62⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"64⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex65⤵PID:1292
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"66⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex67⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"68⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex69⤵PID:1584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"70⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex71⤵PID:1876
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"72⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex73⤵PID:3028
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"74⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex75⤵PID:948
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"76⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex77⤵PID:1532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"78⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex79⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"80⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex81⤵PID:2880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"82⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex83⤵PID:2704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"84⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex85⤵PID:2088
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"86⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex87⤵PID:968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"88⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex89⤵PID:1764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"90⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex91⤵PID:2152
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"92⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex93⤵PID:1336
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"94⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex95⤵PID:2376
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"96⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex97⤵PID:1720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"98⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex99⤵PID:3000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"100⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex101⤵PID:2404
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"102⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex103⤵PID:2684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"104⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex105⤵PID:900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"106⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex107⤵PID:2076
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"108⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex109⤵PID:1384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"110⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex111⤵PID:856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"112⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex113⤵PID:2004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"114⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex115⤵PID:2132
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"116⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex117⤵PID:2596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"118⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex119⤵PID:752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"120⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex121⤵PID:1816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e30007231a1a3aexeexeexeex"122⤵PID:1964
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-