Analysis
-
max time kernel
125s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
68f3893a89aa27exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
68f3893a89aa27exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
68f3893a89aa27exeexeexeex.exe
-
Size
195KB
-
MD5
68f3893a89aa279a8f6e1d5af7da7dd5
-
SHA1
8583cbed9e6df9c8a545503d889f7a3a3f95b651
-
SHA256
6089de32c299a11563bfad6d781504515959d3714fdd910611e7b71e25316de8
-
SHA512
bb9b30768be5ff9cfb0592bdcf5c8669760e29357effef130d4d9fc5c8c6f3db7aaab7509842fd16c55701b5baa7bd584828275a22cd77c1e290073284c20220
-
SSDEEP
3072:5QJMzz2qO8JDa3RWi1AStpZcayvuj35LQJaEvrmcKJHPU/u4F+ezCpspCX:QM3HLaBLASu7uj5Ks/ovzK6K
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 68f3893a89aa27exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\CopySplit.png.exe HeYIkIoM.exe -
Executes dropped EXE 2 IoCs
pid Process 3028 HeYIkIoM.exe 3060 cQAwosQo.exe -
Loads dropped DLL 20 IoCs
pid Process 2392 68f3893a89aa27exeexeexeex.exe 2392 68f3893a89aa27exeexeexeex.exe 2392 68f3893a89aa27exeexeexeex.exe 2392 68f3893a89aa27exeexeexeex.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe 3028 HeYIkIoM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cQAwosQo.exe = "C:\\ProgramData\\xAsYIIYU\\cQAwosQo.exe" 68f3893a89aa27exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Run\HeYIkIoM.exe = "C:\\Users\\Admin\\OIAYUwcw\\HeYIkIoM.exe" HeYIkIoM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cQAwosQo.exe = "C:\\ProgramData\\xAsYIIYU\\cQAwosQo.exe" cQAwosQo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Windows\CurrentVersion\Run\HeYIkIoM.exe = "C:\\Users\\Admin\\OIAYUwcw\\HeYIkIoM.exe" 68f3893a89aa27exeexeexeex.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 68f3893a89aa27exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 68f3893a89aa27exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 68f3893a89aa27exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 68f3893a89aa27exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 68f3893a89aa27exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 68f3893a89aa27exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico HeYIkIoM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1740 reg.exe 3044 reg.exe 2428 Process not Found 2560 reg.exe 1780 reg.exe 2772 reg.exe 2992 Process not Found 1160 reg.exe 1996 reg.exe 2160 reg.exe 964 reg.exe 3024 reg.exe 2644 reg.exe 2112 reg.exe 2284 Process not Found 2400 reg.exe 2748 reg.exe 3020 reg.exe 1480 reg.exe 3004 reg.exe 2824 reg.exe 3056 reg.exe 2452 reg.exe 1200 Process not Found 2308 reg.exe 2780 reg.exe 1044 reg.exe 1588 Process not Found 2940 reg.exe 2152 reg.exe 2676 reg.exe 2312 reg.exe 2004 reg.exe 2752 reg.exe 1828 reg.exe 2268 reg.exe 2344 reg.exe 2636 reg.exe 2704 reg.exe 696 reg.exe 2652 reg.exe 2080 reg.exe 2060 reg.exe 2112 reg.exe 1896 Process not Found 2064 Process not Found 2128 reg.exe 2828 reg.exe 2404 reg.exe 1968 reg.exe 1468 Process not Found 2832 Process not Found 976 reg.exe 2664 reg.exe 2540 reg.exe 2212 reg.exe 2228 reg.exe 2428 reg.exe 628 reg.exe 2516 reg.exe 636 Process not Found 2164 Process not Found 1664 Process not Found 2000 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 68f3893a89aa27exeexeexeex.exe 2392 68f3893a89aa27exeexeexeex.exe 2356 68f3893a89aa27exeexeexeex.exe 2356 68f3893a89aa27exeexeexeex.exe 2636 68f3893a89aa27exeexeexeex.exe 2636 68f3893a89aa27exeexeexeex.exe 2908 68f3893a89aa27exeexeexeex.exe 2908 68f3893a89aa27exeexeexeex.exe 2228 68f3893a89aa27exeexeexeex.exe 2228 68f3893a89aa27exeexeexeex.exe 1848 68f3893a89aa27exeexeexeex.exe 1848 68f3893a89aa27exeexeexeex.exe 1448 68f3893a89aa27exeexeexeex.exe 1448 68f3893a89aa27exeexeexeex.exe 2952 68f3893a89aa27exeexeexeex.exe 2952 68f3893a89aa27exeexeexeex.exe 2296 68f3893a89aa27exeexeexeex.exe 2296 68f3893a89aa27exeexeexeex.exe 1688 68f3893a89aa27exeexeexeex.exe 1688 68f3893a89aa27exeexeexeex.exe 1544 68f3893a89aa27exeexeexeex.exe 1544 68f3893a89aa27exeexeexeex.exe 112 68f3893a89aa27exeexeexeex.exe 112 68f3893a89aa27exeexeexeex.exe 1580 68f3893a89aa27exeexeexeex.exe 1580 68f3893a89aa27exeexeexeex.exe 2084 68f3893a89aa27exeexeexeex.exe 2084 68f3893a89aa27exeexeexeex.exe 848 68f3893a89aa27exeexeexeex.exe 848 68f3893a89aa27exeexeexeex.exe 2364 68f3893a89aa27exeexeexeex.exe 2364 68f3893a89aa27exeexeexeex.exe 964 68f3893a89aa27exeexeexeex.exe 964 68f3893a89aa27exeexeexeex.exe 2396 68f3893a89aa27exeexeexeex.exe 2396 68f3893a89aa27exeexeexeex.exe 2244 68f3893a89aa27exeexeexeex.exe 2244 68f3893a89aa27exeexeexeex.exe 2196 68f3893a89aa27exeexeexeex.exe 2196 68f3893a89aa27exeexeexeex.exe 2080 68f3893a89aa27exeexeexeex.exe 2080 68f3893a89aa27exeexeexeex.exe 1672 68f3893a89aa27exeexeexeex.exe 1672 68f3893a89aa27exeexeexeex.exe 2928 68f3893a89aa27exeexeexeex.exe 2928 68f3893a89aa27exeexeexeex.exe 2764 68f3893a89aa27exeexeexeex.exe 2764 68f3893a89aa27exeexeexeex.exe 3048 68f3893a89aa27exeexeexeex.exe 3048 68f3893a89aa27exeexeexeex.exe 2872 68f3893a89aa27exeexeexeex.exe 2872 68f3893a89aa27exeexeexeex.exe 1764 68f3893a89aa27exeexeexeex.exe 1764 68f3893a89aa27exeexeexeex.exe 1004 68f3893a89aa27exeexeexeex.exe 1004 68f3893a89aa27exeexeexeex.exe 2752 68f3893a89aa27exeexeexeex.exe 2752 68f3893a89aa27exeexeexeex.exe 2848 68f3893a89aa27exeexeexeex.exe 2848 68f3893a89aa27exeexeexeex.exe 1656 68f3893a89aa27exeexeexeex.exe 1656 68f3893a89aa27exeexeexeex.exe 3020 68f3893a89aa27exeexeexeex.exe 3020 68f3893a89aa27exeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 3028 2392 68f3893a89aa27exeexeexeex.exe 28 PID 2392 wrote to memory of 3028 2392 68f3893a89aa27exeexeexeex.exe 28 PID 2392 wrote to memory of 3028 2392 68f3893a89aa27exeexeexeex.exe 28 PID 2392 wrote to memory of 3028 2392 68f3893a89aa27exeexeexeex.exe 28 PID 2392 wrote to memory of 3060 2392 68f3893a89aa27exeexeexeex.exe 29 PID 2392 wrote to memory of 3060 2392 68f3893a89aa27exeexeexeex.exe 29 PID 2392 wrote to memory of 3060 2392 68f3893a89aa27exeexeexeex.exe 29 PID 2392 wrote to memory of 3060 2392 68f3893a89aa27exeexeexeex.exe 29 PID 2392 wrote to memory of 2940 2392 68f3893a89aa27exeexeexeex.exe 30 PID 2392 wrote to memory of 2940 2392 68f3893a89aa27exeexeexeex.exe 30 PID 2392 wrote to memory of 2940 2392 68f3893a89aa27exeexeexeex.exe 30 PID 2392 wrote to memory of 2940 2392 68f3893a89aa27exeexeexeex.exe 30 PID 2940 wrote to memory of 2356 2940 cmd.exe 32 PID 2940 wrote to memory of 2356 2940 cmd.exe 32 PID 2940 wrote to memory of 2356 2940 cmd.exe 32 PID 2940 wrote to memory of 2356 2940 cmd.exe 32 PID 2392 wrote to memory of 2060 2392 68f3893a89aa27exeexeexeex.exe 33 PID 2392 wrote to memory of 2060 2392 68f3893a89aa27exeexeexeex.exe 33 PID 2392 wrote to memory of 2060 2392 68f3893a89aa27exeexeexeex.exe 33 PID 2392 wrote to memory of 2060 2392 68f3893a89aa27exeexeexeex.exe 33 PID 2392 wrote to memory of 2076 2392 68f3893a89aa27exeexeexeex.exe 34 PID 2392 wrote to memory of 2076 2392 68f3893a89aa27exeexeexeex.exe 34 PID 2392 wrote to memory of 2076 2392 68f3893a89aa27exeexeexeex.exe 34 PID 2392 wrote to memory of 2076 2392 68f3893a89aa27exeexeexeex.exe 34 PID 2392 wrote to memory of 1696 2392 68f3893a89aa27exeexeexeex.exe 39 PID 2392 wrote to memory of 1696 2392 68f3893a89aa27exeexeexeex.exe 39 PID 2392 wrote to memory of 1696 2392 68f3893a89aa27exeexeexeex.exe 39 PID 2392 wrote to memory of 1696 2392 68f3893a89aa27exeexeexeex.exe 39 PID 2392 wrote to memory of 2832 2392 68f3893a89aa27exeexeexeex.exe 36 PID 2392 wrote to memory of 2832 2392 68f3893a89aa27exeexeexeex.exe 36 PID 2392 wrote to memory of 2832 2392 68f3893a89aa27exeexeexeex.exe 36 PID 2392 wrote to memory of 2832 2392 68f3893a89aa27exeexeexeex.exe 36 PID 2832 wrote to memory of 1692 2832 cmd.exe 41 PID 2832 wrote to memory of 1692 2832 cmd.exe 41 PID 2832 wrote to memory of 1692 2832 cmd.exe 41 PID 2832 wrote to memory of 1692 2832 cmd.exe 41 PID 2356 wrote to memory of 3040 2356 68f3893a89aa27exeexeexeex.exe 42 PID 2356 wrote to memory of 3040 2356 68f3893a89aa27exeexeexeex.exe 42 PID 2356 wrote to memory of 3040 2356 68f3893a89aa27exeexeexeex.exe 42 PID 2356 wrote to memory of 3040 2356 68f3893a89aa27exeexeexeex.exe 42 PID 3040 wrote to memory of 2636 3040 cmd.exe 44 PID 3040 wrote to memory of 2636 3040 cmd.exe 44 PID 3040 wrote to memory of 2636 3040 cmd.exe 44 PID 3040 wrote to memory of 2636 3040 cmd.exe 44 PID 2356 wrote to memory of 2708 2356 68f3893a89aa27exeexeexeex.exe 45 PID 2356 wrote to memory of 2708 2356 68f3893a89aa27exeexeexeex.exe 45 PID 2356 wrote to memory of 2708 2356 68f3893a89aa27exeexeexeex.exe 45 PID 2356 wrote to memory of 2708 2356 68f3893a89aa27exeexeexeex.exe 45 PID 2356 wrote to memory of 2644 2356 68f3893a89aa27exeexeexeex.exe 46 PID 2356 wrote to memory of 2644 2356 68f3893a89aa27exeexeexeex.exe 46 PID 2356 wrote to memory of 2644 2356 68f3893a89aa27exeexeexeex.exe 46 PID 2356 wrote to memory of 2644 2356 68f3893a89aa27exeexeexeex.exe 46 PID 2356 wrote to memory of 2828 2356 68f3893a89aa27exeexeexeex.exe 47 PID 2356 wrote to memory of 2828 2356 68f3893a89aa27exeexeexeex.exe 47 PID 2356 wrote to memory of 2828 2356 68f3893a89aa27exeexeexeex.exe 47 PID 2356 wrote to memory of 2828 2356 68f3893a89aa27exeexeexeex.exe 47 PID 2356 wrote to memory of 2752 2356 68f3893a89aa27exeexeexeex.exe 52 PID 2356 wrote to memory of 2752 2356 68f3893a89aa27exeexeexeex.exe 52 PID 2356 wrote to memory of 2752 2356 68f3893a89aa27exeexeexeex.exe 52 PID 2356 wrote to memory of 2752 2356 68f3893a89aa27exeexeexeex.exe 52 PID 2752 wrote to memory of 2624 2752 cmd.exe 53 PID 2752 wrote to memory of 2624 2752 cmd.exe 53 PID 2752 wrote to memory of 2624 2752 cmd.exe 53 PID 2752 wrote to memory of 2624 2752 cmd.exe 53 -
System policy modification 1 TTPs 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 68f3893a89aa27exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 68f3893a89aa27exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 68f3893a89aa27exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 68f3893a89aa27exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 68f3893a89aa27exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 68f3893a89aa27exeexeexeex.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\OIAYUwcw\HeYIkIoM.exe"C:\Users\Admin\OIAYUwcw\HeYIkIoM.exe"2⤵
- Modifies extensions of user files
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
PID:3028
-
-
C:\ProgramData\xAsYIIYU\cQAwosQo.exe"C:\ProgramData\xAsYIIYU\cQAwosQo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3060
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"6⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"8⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"10⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"12⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"14⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"16⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"18⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"20⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"22⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"24⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"26⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"28⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"30⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"32⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"34⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"36⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"38⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"40⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"42⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"44⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"46⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"48⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"50⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"52⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"54⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"56⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"58⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"60⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"62⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"64⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex65⤵PID:1312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"66⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex67⤵PID:1600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"68⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex69⤵PID:584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"70⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex71⤵PID:1968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"72⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex73⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"74⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex75⤵PID:2224
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"76⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex77⤵PID:2972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"78⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex79⤵PID:2364
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"80⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex81⤵PID:288
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"82⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex83⤵PID:2944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"84⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex85⤵PID:2196
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"86⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex87⤵PID:2640
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"88⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex89⤵PID:3004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"90⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex91⤵PID:836
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"92⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex93⤵PID:2668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"94⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex95⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"96⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex97⤵PID:1388
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"98⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex99⤵PID:2000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"100⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex101⤵PID:2364
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"102⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex103⤵PID:1908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"104⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex105⤵PID:1576
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"106⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex107⤵PID:1700
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"108⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex109⤵PID:2720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"110⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex111⤵PID:2596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"112⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex113⤵PID:2840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"114⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex115⤵PID:2328
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"116⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex117⤵PID:2192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"118⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex119⤵PID:2544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"120⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex121⤵PID:2540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\68f3893a89aa27exeexeexeex"122⤵PID:880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-