Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
36515fe735a7e69d8434dff3c134a298.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
36515fe735a7e69d8434dff3c134a298.exe
Resource
win10v2004-20240611-en
General
-
Target
36515fe735a7e69d8434dff3c134a298.exe
-
Size
153KB
-
MD5
36515fe735a7e69d8434dff3c134a298
-
SHA1
ec6ba4b24f967339432c26559dea68624b251a6e
-
SHA256
79e6b988a1c90cf8b3dd2d77b5e7684048afa397eb6d6bcd97125c5f136ad11e
-
SHA512
c4be0a594d966e7e390a91e088f52726a48ea164349ce9adfb866085ed4a3b967d5a1a62ed8d592074118234bcc2bc5e4a09f909d4a34779c5aed45d2d249281
-
SSDEEP
3072:jP2jsnPhjww+LwEiSOzPBDlXw0WKWvLmxHNLU3vJVvO:rksGw+UEiSOzPBDdw3KWyrg3vJVv
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (63) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\Geo\Nation wYgYkwMw.exe -
Executes dropped EXE 2 IoCs
pid Process 2140 USAwooEI.exe 2964 wYgYkwMw.exe -
Loads dropped DLL 20 IoCs
pid Process 1752 36515fe735a7e69d8434dff3c134a298.exe 1752 36515fe735a7e69d8434dff3c134a298.exe 1752 36515fe735a7e69d8434dff3c134a298.exe 1752 36515fe735a7e69d8434dff3c134a298.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wYgYkwMw.exe = "C:\\ProgramData\\tKsQAQQk\\wYgYkwMw.exe" 36515fe735a7e69d8434dff3c134a298.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\USAwooEI.exe = "C:\\Users\\Admin\\YMQMsIgM\\USAwooEI.exe" USAwooEI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wYgYkwMw.exe = "C:\\ProgramData\\tKsQAQQk\\wYgYkwMw.exe" wYgYkwMw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\USAwooEI.exe = "C:\\Users\\Admin\\YMQMsIgM\\USAwooEI.exe" 36515fe735a7e69d8434dff3c134a298.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico wYgYkwMw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2868 reg.exe 2860 reg.exe 1468 reg.exe 2708 reg.exe 1756 reg.exe 2632 reg.exe 2428 reg.exe 1728 reg.exe 1444 reg.exe 2188 reg.exe 2152 reg.exe 1080 reg.exe 1832 reg.exe 3032 reg.exe 2400 reg.exe 1688 reg.exe 1204 reg.exe 1232 reg.exe 708 reg.exe 2168 reg.exe 2136 reg.exe 2396 reg.exe 2016 reg.exe 1668 reg.exe 2684 reg.exe 2552 reg.exe 2548 reg.exe 2976 reg.exe 2668 reg.exe 1020 reg.exe 2268 reg.exe 1096 reg.exe 1632 reg.exe 2736 reg.exe 2852 reg.exe 1144 reg.exe 1276 reg.exe 2688 reg.exe 2736 reg.exe 2944 reg.exe 960 reg.exe 1928 reg.exe 1740 reg.exe 2920 reg.exe 2828 reg.exe 1048 reg.exe 3016 reg.exe 2692 reg.exe 2420 reg.exe 1720 reg.exe 2224 reg.exe 1980 reg.exe 2948 reg.exe 3016 reg.exe 780 reg.exe 1976 reg.exe 2316 reg.exe 2324 reg.exe 548 reg.exe 2488 reg.exe 2456 reg.exe 1736 reg.exe 2124 reg.exe 2988 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1752 36515fe735a7e69d8434dff3c134a298.exe 1752 36515fe735a7e69d8434dff3c134a298.exe 2620 36515fe735a7e69d8434dff3c134a298.exe 2620 36515fe735a7e69d8434dff3c134a298.exe 2100 36515fe735a7e69d8434dff3c134a298.exe 2100 36515fe735a7e69d8434dff3c134a298.exe 948 36515fe735a7e69d8434dff3c134a298.exe 948 36515fe735a7e69d8434dff3c134a298.exe 792 36515fe735a7e69d8434dff3c134a298.exe 792 36515fe735a7e69d8434dff3c134a298.exe 2276 36515fe735a7e69d8434dff3c134a298.exe 2276 36515fe735a7e69d8434dff3c134a298.exe 2104 36515fe735a7e69d8434dff3c134a298.exe 2104 36515fe735a7e69d8434dff3c134a298.exe 1752 36515fe735a7e69d8434dff3c134a298.exe 1752 36515fe735a7e69d8434dff3c134a298.exe 2792 36515fe735a7e69d8434dff3c134a298.exe 2792 36515fe735a7e69d8434dff3c134a298.exe 2520 36515fe735a7e69d8434dff3c134a298.exe 2520 36515fe735a7e69d8434dff3c134a298.exe 2920 36515fe735a7e69d8434dff3c134a298.exe 2920 36515fe735a7e69d8434dff3c134a298.exe 540 36515fe735a7e69d8434dff3c134a298.exe 540 36515fe735a7e69d8434dff3c134a298.exe 2844 36515fe735a7e69d8434dff3c134a298.exe 2844 36515fe735a7e69d8434dff3c134a298.exe 2172 36515fe735a7e69d8434dff3c134a298.exe 2172 36515fe735a7e69d8434dff3c134a298.exe 2708 36515fe735a7e69d8434dff3c134a298.exe 2708 36515fe735a7e69d8434dff3c134a298.exe 808 36515fe735a7e69d8434dff3c134a298.exe 808 36515fe735a7e69d8434dff3c134a298.exe 2352 36515fe735a7e69d8434dff3c134a298.exe 2352 36515fe735a7e69d8434dff3c134a298.exe 2932 36515fe735a7e69d8434dff3c134a298.exe 2932 36515fe735a7e69d8434dff3c134a298.exe 1628 36515fe735a7e69d8434dff3c134a298.exe 1628 36515fe735a7e69d8434dff3c134a298.exe 2844 36515fe735a7e69d8434dff3c134a298.exe 2844 36515fe735a7e69d8434dff3c134a298.exe 2544 36515fe735a7e69d8434dff3c134a298.exe 2544 36515fe735a7e69d8434dff3c134a298.exe 3004 36515fe735a7e69d8434dff3c134a298.exe 3004 36515fe735a7e69d8434dff3c134a298.exe 1048 36515fe735a7e69d8434dff3c134a298.exe 1048 36515fe735a7e69d8434dff3c134a298.exe 1792 36515fe735a7e69d8434dff3c134a298.exe 1792 36515fe735a7e69d8434dff3c134a298.exe 2912 36515fe735a7e69d8434dff3c134a298.exe 2912 36515fe735a7e69d8434dff3c134a298.exe 2608 36515fe735a7e69d8434dff3c134a298.exe 2608 36515fe735a7e69d8434dff3c134a298.exe 2200 36515fe735a7e69d8434dff3c134a298.exe 2200 36515fe735a7e69d8434dff3c134a298.exe 2776 36515fe735a7e69d8434dff3c134a298.exe 2776 36515fe735a7e69d8434dff3c134a298.exe 1844 36515fe735a7e69d8434dff3c134a298.exe 1844 36515fe735a7e69d8434dff3c134a298.exe 2044 36515fe735a7e69d8434dff3c134a298.exe 2044 36515fe735a7e69d8434dff3c134a298.exe 2596 36515fe735a7e69d8434dff3c134a298.exe 2596 36515fe735a7e69d8434dff3c134a298.exe 2548 36515fe735a7e69d8434dff3c134a298.exe 2548 36515fe735a7e69d8434dff3c134a298.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2964 wYgYkwMw.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe 2964 wYgYkwMw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2140 1752 36515fe735a7e69d8434dff3c134a298.exe 28 PID 1752 wrote to memory of 2140 1752 36515fe735a7e69d8434dff3c134a298.exe 28 PID 1752 wrote to memory of 2140 1752 36515fe735a7e69d8434dff3c134a298.exe 28 PID 1752 wrote to memory of 2140 1752 36515fe735a7e69d8434dff3c134a298.exe 28 PID 1752 wrote to memory of 2964 1752 36515fe735a7e69d8434dff3c134a298.exe 29 PID 1752 wrote to memory of 2964 1752 36515fe735a7e69d8434dff3c134a298.exe 29 PID 1752 wrote to memory of 2964 1752 36515fe735a7e69d8434dff3c134a298.exe 29 PID 1752 wrote to memory of 2964 1752 36515fe735a7e69d8434dff3c134a298.exe 29 PID 1752 wrote to memory of 2744 1752 36515fe735a7e69d8434dff3c134a298.exe 30 PID 1752 wrote to memory of 2744 1752 36515fe735a7e69d8434dff3c134a298.exe 30 PID 1752 wrote to memory of 2744 1752 36515fe735a7e69d8434dff3c134a298.exe 30 PID 1752 wrote to memory of 2744 1752 36515fe735a7e69d8434dff3c134a298.exe 30 PID 2744 wrote to memory of 2620 2744 cmd.exe 32 PID 2744 wrote to memory of 2620 2744 cmd.exe 32 PID 2744 wrote to memory of 2620 2744 cmd.exe 32 PID 2744 wrote to memory of 2620 2744 cmd.exe 32 PID 1752 wrote to memory of 2824 1752 36515fe735a7e69d8434dff3c134a298.exe 33 PID 1752 wrote to memory of 2824 1752 36515fe735a7e69d8434dff3c134a298.exe 33 PID 1752 wrote to memory of 2824 1752 36515fe735a7e69d8434dff3c134a298.exe 33 PID 1752 wrote to memory of 2824 1752 36515fe735a7e69d8434dff3c134a298.exe 33 PID 1752 wrote to memory of 2828 1752 36515fe735a7e69d8434dff3c134a298.exe 34 PID 1752 wrote to memory of 2828 1752 36515fe735a7e69d8434dff3c134a298.exe 34 PID 1752 wrote to memory of 2828 1752 36515fe735a7e69d8434dff3c134a298.exe 34 PID 1752 wrote to memory of 2828 1752 36515fe735a7e69d8434dff3c134a298.exe 34 PID 1752 wrote to memory of 1648 1752 36515fe735a7e69d8434dff3c134a298.exe 36 PID 1752 wrote to memory of 1648 1752 36515fe735a7e69d8434dff3c134a298.exe 36 PID 1752 wrote to memory of 1648 1752 36515fe735a7e69d8434dff3c134a298.exe 36 PID 1752 wrote to memory of 1648 1752 36515fe735a7e69d8434dff3c134a298.exe 36 PID 1752 wrote to memory of 2768 1752 36515fe735a7e69d8434dff3c134a298.exe 39 PID 1752 wrote to memory of 2768 1752 36515fe735a7e69d8434dff3c134a298.exe 39 PID 1752 wrote to memory of 2768 1752 36515fe735a7e69d8434dff3c134a298.exe 39 PID 1752 wrote to memory of 2768 1752 36515fe735a7e69d8434dff3c134a298.exe 39 PID 2768 wrote to memory of 2472 2768 cmd.exe 41 PID 2768 wrote to memory of 2472 2768 cmd.exe 41 PID 2768 wrote to memory of 2472 2768 cmd.exe 41 PID 2768 wrote to memory of 2472 2768 cmd.exe 41 PID 2620 wrote to memory of 1744 2620 36515fe735a7e69d8434dff3c134a298.exe 42 PID 2620 wrote to memory of 1744 2620 36515fe735a7e69d8434dff3c134a298.exe 42 PID 2620 wrote to memory of 1744 2620 36515fe735a7e69d8434dff3c134a298.exe 42 PID 2620 wrote to memory of 1744 2620 36515fe735a7e69d8434dff3c134a298.exe 42 PID 1744 wrote to memory of 2100 1744 cmd.exe 44 PID 1744 wrote to memory of 2100 1744 cmd.exe 44 PID 1744 wrote to memory of 2100 1744 cmd.exe 44 PID 1744 wrote to memory of 2100 1744 cmd.exe 44 PID 2620 wrote to memory of 2700 2620 36515fe735a7e69d8434dff3c134a298.exe 45 PID 2620 wrote to memory of 2700 2620 36515fe735a7e69d8434dff3c134a298.exe 45 PID 2620 wrote to memory of 2700 2620 36515fe735a7e69d8434dff3c134a298.exe 45 PID 2620 wrote to memory of 2700 2620 36515fe735a7e69d8434dff3c134a298.exe 45 PID 2620 wrote to memory of 2868 2620 36515fe735a7e69d8434dff3c134a298.exe 46 PID 2620 wrote to memory of 2868 2620 36515fe735a7e69d8434dff3c134a298.exe 46 PID 2620 wrote to memory of 2868 2620 36515fe735a7e69d8434dff3c134a298.exe 46 PID 2620 wrote to memory of 2868 2620 36515fe735a7e69d8434dff3c134a298.exe 46 PID 2620 wrote to memory of 2776 2620 36515fe735a7e69d8434dff3c134a298.exe 48 PID 2620 wrote to memory of 2776 2620 36515fe735a7e69d8434dff3c134a298.exe 48 PID 2620 wrote to memory of 2776 2620 36515fe735a7e69d8434dff3c134a298.exe 48 PID 2620 wrote to memory of 2776 2620 36515fe735a7e69d8434dff3c134a298.exe 48 PID 2620 wrote to memory of 2708 2620 36515fe735a7e69d8434dff3c134a298.exe 49 PID 2620 wrote to memory of 2708 2620 36515fe735a7e69d8434dff3c134a298.exe 49 PID 2620 wrote to memory of 2708 2620 36515fe735a7e69d8434dff3c134a298.exe 49 PID 2620 wrote to memory of 2708 2620 36515fe735a7e69d8434dff3c134a298.exe 49 PID 2708 wrote to memory of 776 2708 cmd.exe 53 PID 2708 wrote to memory of 776 2708 cmd.exe 53 PID 2708 wrote to memory of 776 2708 cmd.exe 53 PID 2708 wrote to memory of 776 2708 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exe"C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\YMQMsIgM\USAwooEI.exe"C:\Users\Admin\YMQMsIgM\USAwooEI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2140
-
-
C:\ProgramData\tKsQAQQk\wYgYkwMw.exe"C:\ProgramData\tKsQAQQk\wYgYkwMw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2964
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"2⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a2983⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"4⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a2985⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"6⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a2987⤵
- Suspicious behavior: EnumeratesProcesses
PID:948 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"8⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a2989⤵
- Suspicious behavior: EnumeratesProcesses
PID:792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"10⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29811⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"12⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29813⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"14⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29815⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"16⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29817⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"18⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29819⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"20⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29821⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"22⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29823⤵
- Suspicious behavior: EnumeratesProcesses
PID:540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"24⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29825⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"26⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29827⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"28⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29829⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"30⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29831⤵
- Suspicious behavior: EnumeratesProcesses
PID:808 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"32⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29833⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"34⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29835⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"36⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29837⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"38⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29839⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"40⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29841⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"42⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29843⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"44⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29845⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"46⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29847⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"48⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29849⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"50⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29851⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"52⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29853⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"54⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29855⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"56⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29857⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"58⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29859⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"60⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29861⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"62⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29863⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"64⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29865⤵PID:2640
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"66⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29867⤵PID:3060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"68⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29869⤵PID:384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"70⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29871⤵PID:860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"72⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29873⤵PID:2796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"74⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29875⤵PID:2912
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"76⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29877⤵PID:2444
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"78⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29879⤵PID:2728
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"80⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29881⤵PID:3068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"82⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29883⤵PID:2212
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"84⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29885⤵PID:1460
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"86⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29887⤵PID:1980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"88⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29889⤵PID:2712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"90⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29891⤵PID:2552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"92⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29893⤵PID:1472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"94⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29895⤵PID:2448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"96⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29897⤵PID:2996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"98⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a29899⤵PID:2852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"100⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298101⤵PID:584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"102⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298103⤵PID:1744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"104⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298105⤵PID:2036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"106⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298107⤵PID:2168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"108⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298109⤵PID:2492
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"110⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298111⤵PID:1744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"112⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298113⤵PID:1844
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"114⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298115⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"116⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298117⤵PID:1304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"118⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298119⤵PID:1560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"120⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298.exeC:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298121⤵PID:1680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\36515fe735a7e69d8434dff3c134a298"122⤵PID:2504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-