Analysis
-
max time kernel
137s -
max time network
80s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
06-07-2023 13:40
Static task
static1
Behavioral task
behavioral1
Sample
5cdfaad20cdf58exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
5cdfaad20cdf58exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
5cdfaad20cdf58exeexeexeex.exe
-
Size
334KB
-
MD5
5cdfaad20cdf5895477b8dd451a38b76
-
SHA1
f59d1bc399d988d5d5169e7df09b8e57589c1127
-
SHA256
1fbfc0b007a6e3e6d21635f4fc6862f73193a94eb54ca6561eb8de30ede2b155
-
SHA512
78229d6cd0432671aa91a770a95b97691376d1283a6ad4be59cb01eb439e987eb87f341405fe54889f6e2957fe874c6940d53ade0dcaf0be7698a634b86828d1
-
SSDEEP
6144:lv3XLrZ99999999999999X99999999999999X99999999999999X99999999999j:NnLrZ99999999999999X99999999999D
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\StepMeasure.png.exe nYAssIgA.exe -
Executes dropped EXE 2 IoCs
pid Process 2864 JKEYEYgQ.exe 2892 nYAssIgA.exe -
Loads dropped DLL 20 IoCs
pid Process 2212 5cdfaad20cdf58exeexeexeex.exe 2212 5cdfaad20cdf58exeexeexeex.exe 2212 5cdfaad20cdf58exeexeexeex.exe 2212 5cdfaad20cdf58exeexeexeex.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe 2892 nYAssIgA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Run\JKEYEYgQ.exe = "C:\\Users\\Admin\\TgkIoIgc\\JKEYEYgQ.exe" JKEYEYgQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nYAssIgA.exe = "C:\\ProgramData\\ayAkAcYw\\nYAssIgA.exe" nYAssIgA.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Run\JKEYEYgQ.exe = "C:\\Users\\Admin\\TgkIoIgc\\JKEYEYgQ.exe" 5cdfaad20cdf58exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nYAssIgA.exe = "C:\\ProgramData\\ayAkAcYw\\nYAssIgA.exe" 5cdfaad20cdf58exeexeexeex.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2520 reg.exe 2768 reg.exe 2028 reg.exe 2872 reg.exe 1668 reg.exe 2980 reg.exe 2584 reg.exe 2372 reg.exe 3004 reg.exe 988 reg.exe 2644 reg.exe 1376 reg.exe 436 reg.exe 2760 reg.exe 2156 reg.exe 1616 reg.exe 556 reg.exe 1728 reg.exe 2292 reg.exe 2508 reg.exe 1328 reg.exe 2760 reg.exe 1824 reg.exe 2196 reg.exe 2108 Process not Found 2208 reg.exe 628 reg.exe 2728 reg.exe 1532 reg.exe 2580 reg.exe 1028 reg.exe 1364 reg.exe 764 reg.exe 1680 reg.exe 1276 reg.exe 948 reg.exe 2636 reg.exe 1944 reg.exe 2600 reg.exe 2056 reg.exe 3052 reg.exe 2500 reg.exe 2524 reg.exe 2664 reg.exe 484 reg.exe 1700 reg.exe 3016 reg.exe 2448 reg.exe 2328 reg.exe 556 reg.exe 2460 reg.exe 1820 reg.exe 112 reg.exe 2096 reg.exe 1496 reg.exe 2908 reg.exe 1248 reg.exe 764 reg.exe 2808 reg.exe 2260 reg.exe 2124 reg.exe 2668 reg.exe 2252 reg.exe 2108 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2212 5cdfaad20cdf58exeexeexeex.exe 2212 5cdfaad20cdf58exeexeexeex.exe 3004 5cdfaad20cdf58exeexeexeex.exe 3004 5cdfaad20cdf58exeexeexeex.exe 2720 5cdfaad20cdf58exeexeexeex.exe 2720 5cdfaad20cdf58exeexeexeex.exe 2552 5cdfaad20cdf58exeexeexeex.exe 2552 5cdfaad20cdf58exeexeexeex.exe 1532 5cdfaad20cdf58exeexeexeex.exe 1532 5cdfaad20cdf58exeexeexeex.exe 2432 5cdfaad20cdf58exeexeexeex.exe 2432 5cdfaad20cdf58exeexeexeex.exe 1664 5cdfaad20cdf58exeexeexeex.exe 1664 5cdfaad20cdf58exeexeexeex.exe 840 5cdfaad20cdf58exeexeexeex.exe 840 5cdfaad20cdf58exeexeexeex.exe 2716 5cdfaad20cdf58exeexeexeex.exe 2716 5cdfaad20cdf58exeexeexeex.exe 2620 5cdfaad20cdf58exeexeexeex.exe 2620 5cdfaad20cdf58exeexeexeex.exe 1572 5cdfaad20cdf58exeexeexeex.exe 1572 5cdfaad20cdf58exeexeexeex.exe 1884 5cdfaad20cdf58exeexeexeex.exe 1884 5cdfaad20cdf58exeexeexeex.exe 1528 5cdfaad20cdf58exeexeexeex.exe 1528 5cdfaad20cdf58exeexeexeex.exe 1584 5cdfaad20cdf58exeexeexeex.exe 1584 5cdfaad20cdf58exeexeexeex.exe 2296 5cdfaad20cdf58exeexeexeex.exe 2296 5cdfaad20cdf58exeexeexeex.exe 2828 5cdfaad20cdf58exeexeexeex.exe 2828 5cdfaad20cdf58exeexeexeex.exe 1720 5cdfaad20cdf58exeexeexeex.exe 1720 5cdfaad20cdf58exeexeexeex.exe 1700 5cdfaad20cdf58exeexeexeex.exe 1700 5cdfaad20cdf58exeexeexeex.exe 2328 5cdfaad20cdf58exeexeexeex.exe 2328 5cdfaad20cdf58exeexeexeex.exe 1092 5cdfaad20cdf58exeexeexeex.exe 1092 5cdfaad20cdf58exeexeexeex.exe 2124 5cdfaad20cdf58exeexeexeex.exe 2124 5cdfaad20cdf58exeexeexeex.exe 2784 5cdfaad20cdf58exeexeexeex.exe 2784 5cdfaad20cdf58exeexeexeex.exe 2552 5cdfaad20cdf58exeexeexeex.exe 2552 5cdfaad20cdf58exeexeexeex.exe 2464 5cdfaad20cdf58exeexeexeex.exe 2464 5cdfaad20cdf58exeexeexeex.exe 1676 5cdfaad20cdf58exeexeexeex.exe 1676 5cdfaad20cdf58exeexeexeex.exe 576 5cdfaad20cdf58exeexeexeex.exe 576 5cdfaad20cdf58exeexeexeex.exe 592 5cdfaad20cdf58exeexeexeex.exe 592 5cdfaad20cdf58exeexeexeex.exe 2616 5cdfaad20cdf58exeexeexeex.exe 2616 5cdfaad20cdf58exeexeexeex.exe 3016 5cdfaad20cdf58exeexeexeex.exe 3016 5cdfaad20cdf58exeexeexeex.exe 1672 5cdfaad20cdf58exeexeexeex.exe 1672 5cdfaad20cdf58exeexeexeex.exe 2360 5cdfaad20cdf58exeexeexeex.exe 2360 5cdfaad20cdf58exeexeexeex.exe 2976 5cdfaad20cdf58exeexeexeex.exe 2976 5cdfaad20cdf58exeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2864 2212 5cdfaad20cdf58exeexeexeex.exe 28 PID 2212 wrote to memory of 2864 2212 5cdfaad20cdf58exeexeexeex.exe 28 PID 2212 wrote to memory of 2864 2212 5cdfaad20cdf58exeexeexeex.exe 28 PID 2212 wrote to memory of 2864 2212 5cdfaad20cdf58exeexeexeex.exe 28 PID 2212 wrote to memory of 2892 2212 5cdfaad20cdf58exeexeexeex.exe 29 PID 2212 wrote to memory of 2892 2212 5cdfaad20cdf58exeexeexeex.exe 29 PID 2212 wrote to memory of 2892 2212 5cdfaad20cdf58exeexeexeex.exe 29 PID 2212 wrote to memory of 2892 2212 5cdfaad20cdf58exeexeexeex.exe 29 PID 2212 wrote to memory of 2088 2212 5cdfaad20cdf58exeexeexeex.exe 30 PID 2212 wrote to memory of 2088 2212 5cdfaad20cdf58exeexeexeex.exe 30 PID 2212 wrote to memory of 2088 2212 5cdfaad20cdf58exeexeexeex.exe 30 PID 2212 wrote to memory of 2088 2212 5cdfaad20cdf58exeexeexeex.exe 30 PID 2212 wrote to memory of 1136 2212 5cdfaad20cdf58exeexeexeex.exe 32 PID 2212 wrote to memory of 1136 2212 5cdfaad20cdf58exeexeexeex.exe 32 PID 2212 wrote to memory of 1136 2212 5cdfaad20cdf58exeexeexeex.exe 32 PID 2212 wrote to memory of 1136 2212 5cdfaad20cdf58exeexeexeex.exe 32 PID 2212 wrote to memory of 1948 2212 5cdfaad20cdf58exeexeexeex.exe 33 PID 2212 wrote to memory of 1948 2212 5cdfaad20cdf58exeexeexeex.exe 33 PID 2212 wrote to memory of 1948 2212 5cdfaad20cdf58exeexeexeex.exe 33 PID 2212 wrote to memory of 1948 2212 5cdfaad20cdf58exeexeexeex.exe 33 PID 2212 wrote to memory of 764 2212 5cdfaad20cdf58exeexeexeex.exe 35 PID 2212 wrote to memory of 764 2212 5cdfaad20cdf58exeexeexeex.exe 35 PID 2212 wrote to memory of 764 2212 5cdfaad20cdf58exeexeexeex.exe 35 PID 2212 wrote to memory of 764 2212 5cdfaad20cdf58exeexeexeex.exe 35 PID 2212 wrote to memory of 2812 2212 5cdfaad20cdf58exeexeexeex.exe 38 PID 2212 wrote to memory of 2812 2212 5cdfaad20cdf58exeexeexeex.exe 38 PID 2212 wrote to memory of 2812 2212 5cdfaad20cdf58exeexeexeex.exe 38 PID 2212 wrote to memory of 2812 2212 5cdfaad20cdf58exeexeexeex.exe 38 PID 2088 wrote to memory of 3004 2088 cmd.exe 40 PID 2088 wrote to memory of 3004 2088 cmd.exe 40 PID 2088 wrote to memory of 3004 2088 cmd.exe 40 PID 2088 wrote to memory of 3004 2088 cmd.exe 40 PID 2812 wrote to memory of 1736 2812 cmd.exe 41 PID 2812 wrote to memory of 1736 2812 cmd.exe 41 PID 2812 wrote to memory of 1736 2812 cmd.exe 41 PID 2812 wrote to memory of 1736 2812 cmd.exe 41 PID 3004 wrote to memory of 2584 3004 5cdfaad20cdf58exeexeexeex.exe 42 PID 3004 wrote to memory of 2584 3004 5cdfaad20cdf58exeexeexeex.exe 42 PID 3004 wrote to memory of 2584 3004 5cdfaad20cdf58exeexeexeex.exe 42 PID 3004 wrote to memory of 2584 3004 5cdfaad20cdf58exeexeexeex.exe 42 PID 2584 wrote to memory of 2720 2584 cmd.exe 44 PID 2584 wrote to memory of 2720 2584 cmd.exe 44 PID 2584 wrote to memory of 2720 2584 cmd.exe 44 PID 2584 wrote to memory of 2720 2584 cmd.exe 44 PID 3004 wrote to memory of 2748 3004 5cdfaad20cdf58exeexeexeex.exe 45 PID 3004 wrote to memory of 2748 3004 5cdfaad20cdf58exeexeexeex.exe 45 PID 3004 wrote to memory of 2748 3004 5cdfaad20cdf58exeexeexeex.exe 45 PID 3004 wrote to memory of 2748 3004 5cdfaad20cdf58exeexeexeex.exe 45 PID 3004 wrote to memory of 2760 3004 5cdfaad20cdf58exeexeexeex.exe 46 PID 3004 wrote to memory of 2760 3004 5cdfaad20cdf58exeexeexeex.exe 46 PID 3004 wrote to memory of 2760 3004 5cdfaad20cdf58exeexeexeex.exe 46 PID 3004 wrote to memory of 2760 3004 5cdfaad20cdf58exeexeexeex.exe 46 PID 3004 wrote to memory of 2632 3004 5cdfaad20cdf58exeexeexeex.exe 48 PID 3004 wrote to memory of 2632 3004 5cdfaad20cdf58exeexeexeex.exe 48 PID 3004 wrote to memory of 2632 3004 5cdfaad20cdf58exeexeexeex.exe 48 PID 3004 wrote to memory of 2632 3004 5cdfaad20cdf58exeexeexeex.exe 48 PID 3004 wrote to memory of 2608 3004 5cdfaad20cdf58exeexeexeex.exe 49 PID 3004 wrote to memory of 2608 3004 5cdfaad20cdf58exeexeexeex.exe 49 PID 3004 wrote to memory of 2608 3004 5cdfaad20cdf58exeexeexeex.exe 49 PID 3004 wrote to memory of 2608 3004 5cdfaad20cdf58exeexeexeex.exe 49 PID 2608 wrote to memory of 2652 2608 cmd.exe 53 PID 2608 wrote to memory of 2652 2608 cmd.exe 53 PID 2608 wrote to memory of 2652 2608 cmd.exe 53 PID 2608 wrote to memory of 2652 2608 cmd.exe 53 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\TgkIoIgc\JKEYEYgQ.exe"C:\Users\Admin\TgkIoIgc\JKEYEYgQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2864
-
-
C:\ProgramData\ayAkAcYw\nYAssIgA.exe"C:\ProgramData\ayAkAcYw\nYAssIgA.exe"2⤵
- Modifies extensions of user files
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2892
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"6⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"8⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"10⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"12⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"14⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"16⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"18⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"20⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"22⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"24⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"26⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"28⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"30⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"32⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"34⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"36⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"38⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"40⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"42⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"44⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"46⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"48⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"50⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"52⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:592 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"54⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"56⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"58⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"60⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"62⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"64⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex65⤵PID:2520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"66⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex67⤵PID:2728
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"68⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex69⤵PID:2236
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"70⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex71⤵PID:2440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"72⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex73⤵PID:268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"74⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex75⤵PID:840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"76⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex77⤵PID:2284
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"78⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex79⤵PID:2252
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"80⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex81⤵PID:1768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"82⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex83⤵PID:2440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"84⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex85⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"86⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex87⤵PID:2920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"88⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex89⤵PID:2376
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"90⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex91⤵PID:2180
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"92⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex93⤵PID:1156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"94⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex95⤵PID:2924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"96⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex97⤵PID:2436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"98⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex99⤵PID:1708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"100⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex101⤵PID:2828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"102⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex103⤵PID:2208
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"104⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex105⤵PID:1784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"106⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex107⤵PID:2268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"108⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex109⤵PID:2952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"110⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex111⤵PID:1284
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"112⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex113⤵PID:2704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"114⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex115⤵PID:1180
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"116⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex117⤵PID:2840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"118⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex119⤵PID:764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"120⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex121⤵PID:1276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5cdfaad20cdf58exeexeexeex"122⤵PID:2956
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-