Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
cbeb8a1dc9c1cc99182866d178ecaea8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cbeb8a1dc9c1cc99182866d178ecaea8.exe
Resource
win10v2004-20230220-en
General
-
Target
cbeb8a1dc9c1cc99182866d178ecaea8.exe
-
Size
189KB
-
MD5
cbeb8a1dc9c1cc99182866d178ecaea8
-
SHA1
4fed98767f06ef15b165c4baa69ac9adfbcfc794
-
SHA256
f94a87a6b2201c05a4222db550ce2ea96991165ee8b3c25af7bfeb5a8bbd8d51
-
SHA512
0b46422897e1e0302fc29e3a7625fea0b929eefc4ca506616bc7456596e8520bfb047aaa73baf304991bddb6dfca6bf93673b5738555ad40e00f8ee6d60d80b5
-
SSDEEP
3072:TxoZBytUbHRMDHJA8rXlm+TjeVfsHSz26jk:FoZB+Uj8X4+6sHSi6jk
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 900 NWUswoUg.exe 772 Amgcgckk.exe -
Loads dropped DLL 8 IoCs
pid Process 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 900 NWUswoUg.exe 900 NWUswoUg.exe 900 NWUswoUg.exe 900 NWUswoUg.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Amgcgckk.exe = "C:\\ProgramData\\AYQMckgQ\\Amgcgckk.exe" Amgcgckk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\OIgEMQoo.exe = "C:\\Users\\Admin\\cQMQYgcA\\OIgEMQoo.exe" cbeb8a1dc9c1cc99182866d178ecaea8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FuAAcEkU.exe = "C:\\ProgramData\\KoEAEoUM\\FuAAcEkU.exe" cbeb8a1dc9c1cc99182866d178ecaea8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NWUswoUg.exe = "C:\\Users\\Admin\\asokIoMg\\NWUswoUg.exe" cbeb8a1dc9c1cc99182866d178ecaea8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Amgcgckk.exe = "C:\\ProgramData\\AYQMckgQ\\Amgcgckk.exe" cbeb8a1dc9c1cc99182866d178ecaea8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NWUswoUg.exe = "C:\\Users\\Admin\\asokIoMg\\NWUswoUg.exe" NWUswoUg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1872 1960 WerFault.exe 101 1336 2024 WerFault.exe 102 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 864 reg.exe 624 reg.exe 1924 reg.exe 1824 reg.exe 844 reg.exe 1520 reg.exe 1364 reg.exe 316 reg.exe 864 reg.exe 1320 reg.exe 976 reg.exe 376 reg.exe 896 reg.exe 612 reg.exe 1428 reg.exe 2000 reg.exe 1264 reg.exe 2004 reg.exe 1940 reg.exe 1052 reg.exe 1728 reg.exe 924 reg.exe 376 reg.exe 1008 reg.exe 1708 reg.exe 764 reg.exe 1604 reg.exe 2008 reg.exe 484 reg.exe 1488 reg.exe 1500 reg.exe 1724 reg.exe 1520 reg.exe 2016 reg.exe 524 reg.exe 300 reg.exe 1644 reg.exe 1556 reg.exe 752 reg.exe 1768 reg.exe 1744 reg.exe 1744 reg.exe 844 reg.exe 1364 reg.exe 1828 reg.exe 844 reg.exe 1732 reg.exe 2032 reg.exe 1356 reg.exe 1584 reg.exe 1608 reg.exe 316 reg.exe 764 reg.exe 1152 reg.exe 1108 reg.exe 624 reg.exe 316 reg.exe 668 reg.exe 1740 reg.exe 1560 reg.exe 948 reg.exe 1924 reg.exe 1580 reg.exe 1520 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1864 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1864 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1008 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1008 cbeb8a1dc9c1cc99182866d178ecaea8.exe 876 cbeb8a1dc9c1cc99182866d178ecaea8.exe 876 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1052 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1052 cbeb8a1dc9c1cc99182866d178ecaea8.exe 576 cbeb8a1dc9c1cc99182866d178ecaea8.exe 576 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1560 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1560 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1056 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1056 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1312 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1312 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1152 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1152 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1348 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1348 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1548 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1548 cbeb8a1dc9c1cc99182866d178ecaea8.exe 980 cbeb8a1dc9c1cc99182866d178ecaea8.exe 980 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1744 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1744 cbeb8a1dc9c1cc99182866d178ecaea8.exe 836 cbeb8a1dc9c1cc99182866d178ecaea8.exe 836 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1776 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1776 cbeb8a1dc9c1cc99182866d178ecaea8.exe 896 cbeb8a1dc9c1cc99182866d178ecaea8.exe 896 cbeb8a1dc9c1cc99182866d178ecaea8.exe 320 cbeb8a1dc9c1cc99182866d178ecaea8.exe 320 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1772 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1772 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1752 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1752 cbeb8a1dc9c1cc99182866d178ecaea8.exe 980 cbeb8a1dc9c1cc99182866d178ecaea8.exe 980 cbeb8a1dc9c1cc99182866d178ecaea8.exe 2028 cbeb8a1dc9c1cc99182866d178ecaea8.exe 2028 cbeb8a1dc9c1cc99182866d178ecaea8.exe 944 cbeb8a1dc9c1cc99182866d178ecaea8.exe 944 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1548 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1548 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1664 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1664 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1760 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1760 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1952 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1952 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1664 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1664 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1500 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1500 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1696 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1696 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1164 cbeb8a1dc9c1cc99182866d178ecaea8.exe 1164 cbeb8a1dc9c1cc99182866d178ecaea8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 900 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 27 PID 1924 wrote to memory of 900 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 27 PID 1924 wrote to memory of 900 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 27 PID 1924 wrote to memory of 900 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 27 PID 1924 wrote to memory of 772 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 28 PID 1924 wrote to memory of 772 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 28 PID 1924 wrote to memory of 772 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 28 PID 1924 wrote to memory of 772 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 28 PID 1924 wrote to memory of 1056 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 29 PID 1924 wrote to memory of 1056 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 29 PID 1924 wrote to memory of 1056 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 29 PID 1924 wrote to memory of 1056 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 29 PID 1056 wrote to memory of 1848 1056 cmd.exe 31 PID 1056 wrote to memory of 1848 1056 cmd.exe 31 PID 1056 wrote to memory of 1848 1056 cmd.exe 31 PID 1056 wrote to memory of 1848 1056 cmd.exe 31 PID 1924 wrote to memory of 1548 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 32 PID 1924 wrote to memory of 1548 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 32 PID 1924 wrote to memory of 1548 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 32 PID 1924 wrote to memory of 1548 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 32 PID 1924 wrote to memory of 944 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 33 PID 1924 wrote to memory of 944 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 33 PID 1924 wrote to memory of 944 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 33 PID 1924 wrote to memory of 944 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 33 PID 1924 wrote to memory of 1704 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 36 PID 1924 wrote to memory of 1704 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 36 PID 1924 wrote to memory of 1704 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 36 PID 1924 wrote to memory of 1704 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 36 PID 1924 wrote to memory of 2004 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 37 PID 1924 wrote to memory of 2004 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 37 PID 1924 wrote to memory of 2004 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 37 PID 1924 wrote to memory of 2004 1924 cbeb8a1dc9c1cc99182866d178ecaea8.exe 37 PID 2004 wrote to memory of 1632 2004 cmd.exe 40 PID 2004 wrote to memory of 1632 2004 cmd.exe 40 PID 2004 wrote to memory of 1632 2004 cmd.exe 40 PID 2004 wrote to memory of 1632 2004 cmd.exe 40 PID 1848 wrote to memory of 896 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 41 PID 1848 wrote to memory of 896 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 41 PID 1848 wrote to memory of 896 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 41 PID 1848 wrote to memory of 896 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 41 PID 896 wrote to memory of 1864 896 cmd.exe 43 PID 896 wrote to memory of 1864 896 cmd.exe 43 PID 896 wrote to memory of 1864 896 cmd.exe 43 PID 896 wrote to memory of 1864 896 cmd.exe 43 PID 1848 wrote to memory of 1660 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 44 PID 1848 wrote to memory of 1660 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 44 PID 1848 wrote to memory of 1660 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 44 PID 1848 wrote to memory of 1660 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 44 PID 1848 wrote to memory of 1740 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 47 PID 1848 wrote to memory of 1740 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 47 PID 1848 wrote to memory of 1740 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 47 PID 1848 wrote to memory of 1740 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 47 PID 1848 wrote to memory of 1556 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 46 PID 1848 wrote to memory of 1556 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 46 PID 1848 wrote to memory of 1556 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 46 PID 1848 wrote to memory of 1556 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 46 PID 1848 wrote to memory of 1800 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 48 PID 1848 wrote to memory of 1800 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 48 PID 1848 wrote to memory of 1800 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 48 PID 1848 wrote to memory of 1800 1848 cbeb8a1dc9c1cc99182866d178ecaea8.exe 48 PID 1800 wrote to memory of 1760 1800 cmd.exe 52 PID 1800 wrote to memory of 1760 1800 cmd.exe 52 PID 1800 wrote to memory of 1760 1800 cmd.exe 52 PID 1800 wrote to memory of 1760 1800 cmd.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exe"C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\asokIoMg\NWUswoUg.exe"C:\Users\Admin\asokIoMg\NWUswoUg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:900
-
-
C:\ProgramData\AYQMckgQ\Amgcgckk.exe"C:\ProgramData\AYQMckgQ\Amgcgckk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:772
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"2⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea83⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"4⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea85⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"6⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea87⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"8⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea89⤵
- Suspicious behavior: EnumeratesProcesses
PID:876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"10⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea811⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"12⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea813⤵
- Adds Run key to start application
PID:1264 -
C:\Users\Admin\cQMQYgcA\OIgEMQoo.exe"C:\Users\Admin\cQMQYgcA\OIgEMQoo.exe"14⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 3615⤵
- Program crash
PID:1872
-
-
-
C:\ProgramData\KoEAEoUM\FuAAcEkU.exe"C:\ProgramData\KoEAEoUM\FuAAcEkU.exe"14⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 3615⤵
- Program crash
PID:1336
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"14⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea815⤵
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"16⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea817⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"18⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea819⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"20⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea821⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"22⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea823⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"24⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea825⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"26⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea827⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"28⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea829⤵
- Suspicious behavior: EnumeratesProcesses
PID:980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"30⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea831⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"32⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea833⤵
- Suspicious behavior: EnumeratesProcesses
PID:836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"34⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea835⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"36⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea837⤵
- Suspicious behavior: EnumeratesProcesses
PID:896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"38⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea839⤵
- Suspicious behavior: EnumeratesProcesses
PID:320 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"40⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea841⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"42⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea843⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"44⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea845⤵
- Suspicious behavior: EnumeratesProcesses
PID:980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"46⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea847⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"48⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea849⤵
- Suspicious behavior: EnumeratesProcesses
PID:944 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"50⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea851⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"52⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea853⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"54⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea855⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"56⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea857⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"58⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea859⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"60⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea861⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"62⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea863⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"64⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea865⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"66⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea867⤵PID:484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"68⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea869⤵PID:1056
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"70⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea871⤵PID:2000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"72⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea873⤵PID:572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"74⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea875⤵PID:1744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"76⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea877⤵PID:1312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"78⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea879⤵PID:1712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"80⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea881⤵PID:2032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"82⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea883⤵PID:1776
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"84⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea885⤵PID:1540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"86⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea887⤵PID:1632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"88⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea889⤵PID:1924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"90⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea891⤵PID:1848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"92⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea893⤵PID:1952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"94⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea895⤵PID:1312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"96⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea897⤵PID:1580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"98⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea899⤵PID:948
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"100⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8101⤵PID:1052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"102⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8103⤵PID:1428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"104⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8105⤵PID:376
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"106⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8107⤵PID:1660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"108⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8109⤵PID:1500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"110⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8111⤵PID:556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"112⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8113⤵PID:300
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"114⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8115⤵PID:2008
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"116⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8117⤵PID:2016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"118⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8119⤵PID:1664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"120⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8.exeC:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8121⤵PID:1064
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cbeb8a1dc9c1cc99182866d178ecaea8"122⤵PID:376
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-