Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
965ad2194c6756exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
965ad2194c6756exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
965ad2194c6756exeexeexeex.exe
-
Size
203KB
-
MD5
965ad2194c675628306ad5c88672924b
-
SHA1
a3de1053ab42a63dacfc9950da8a35721bdc2d7d
-
SHA256
70545c9965821803457d4365df75607a048330318a475c9a9edb1c30cca6a09b
-
SHA512
950e98b4c6b2a13cc96db091522ae537f5194cb992eac1572c0dab4464d5ae605a55a5c4da40b56af5e3c5a1c141918416f0b662c340490ddc47026160d7da5a
-
SSDEEP
6144:Xb966THtJEaFBTSjZkgnjfiNFwwzTdSvw/:X5fEaFBTsZkgnjfiNFwwzk2
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\CloseWait.png.exe tSAsQskI.exe File created C:\Users\Admin\Pictures\ExportWatch.png.exe tSAsQskI.exe File created C:\Users\Admin\Pictures\StepRegister.png.exe tSAsQskI.exe -
Executes dropped EXE 2 IoCs
pid Process 1760 AaoIAIUw.exe 2876 tSAsQskI.exe -
Loads dropped DLL 20 IoCs
pid Process 1344 965ad2194c6756exeexeexeex.exe 1344 965ad2194c6756exeexeexeex.exe 1344 965ad2194c6756exeexeexeex.exe 1344 965ad2194c6756exeexeexeex.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe 2876 tSAsQskI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\tSAsQskI.exe = "C:\\ProgramData\\WOQEwkgM\\tSAsQskI.exe" tSAsQskI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Run\OcoUgcos.exe = "C:\\Users\\Admin\\cEgwMkog\\OcoUgcos.exe" 965ad2194c6756exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EKMAEAAE.exe = "C:\\ProgramData\\IUYAIAAI\\EKMAEAAE.exe" 965ad2194c6756exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Run\AaoIAIUw.exe = "C:\\Users\\Admin\\AAgYAQos\\AaoIAIUw.exe" 965ad2194c6756exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\tSAsQskI.exe = "C:\\ProgramData\\WOQEwkgM\\tSAsQskI.exe" 965ad2194c6756exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Run\AaoIAIUw.exe = "C:\\Users\\Admin\\AAgYAQos\\AaoIAIUw.exe" AaoIAIUw.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico tSAsQskI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1704 1728 WerFault.exe 991 540 2448 WerFault.exe 993 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1548 reg.exe 2204 reg.exe 1720 reg.exe 2516 reg.exe 2128 reg.exe 2848 reg.exe 2796 reg.exe 2220 reg.exe 2472 Process not Found 1568 reg.exe 1712 reg.exe 2400 reg.exe 2380 reg.exe 2564 reg.exe 3040 reg.exe 1516 reg.exe 2180 Process not Found 2808 reg.exe 1764 reg.exe 2184 reg.exe 2332 reg.exe 1292 Process not Found 2836 Process not Found 2392 reg.exe 2348 reg.exe 1572 reg.exe 1192 reg.exe 816 reg.exe 1248 reg.exe 1332 reg.exe 2632 reg.exe 1792 reg.exe 888 reg.exe 2652 reg.exe 1620 reg.exe 1516 reg.exe 2584 reg.exe 1700 reg.exe 2612 reg.exe 1368 reg.exe 2456 reg.exe 2948 reg.exe 2816 reg.exe 2028 reg.exe 2784 reg.exe 308 reg.exe 564 Process not Found 2132 Process not Found 2252 reg.exe 968 reg.exe 3040 reg.exe 1072 reg.exe 2348 reg.exe 1624 reg.exe 2232 Process not Found 1524 reg.exe 2628 reg.exe 2548 reg.exe 1248 reg.exe 2916 reg.exe 2812 reg.exe 2568 Process not Found 1428 reg.exe 1576 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1344 965ad2194c6756exeexeexeex.exe 1344 965ad2194c6756exeexeexeex.exe 1680 965ad2194c6756exeexeexeex.exe 1680 965ad2194c6756exeexeexeex.exe 2696 965ad2194c6756exeexeexeex.exe 2696 965ad2194c6756exeexeexeex.exe 2528 965ad2194c6756exeexeexeex.exe 2528 965ad2194c6756exeexeexeex.exe 2664 965ad2194c6756exeexeexeex.exe 2664 965ad2194c6756exeexeexeex.exe 2076 965ad2194c6756exeexeexeex.exe 2076 965ad2194c6756exeexeexeex.exe 2280 965ad2194c6756exeexeexeex.exe 2280 965ad2194c6756exeexeexeex.exe 2108 965ad2194c6756exeexeexeex.exe 2108 965ad2194c6756exeexeexeex.exe 2920 965ad2194c6756exeexeexeex.exe 2920 965ad2194c6756exeexeexeex.exe 2820 965ad2194c6756exeexeexeex.exe 2820 965ad2194c6756exeexeexeex.exe 1376 965ad2194c6756exeexeexeex.exe 1376 965ad2194c6756exeexeexeex.exe 1112 965ad2194c6756exeexeexeex.exe 1112 965ad2194c6756exeexeexeex.exe 908 965ad2194c6756exeexeexeex.exe 908 965ad2194c6756exeexeexeex.exe 2856 965ad2194c6756exeexeexeex.exe 2856 965ad2194c6756exeexeexeex.exe 1512 965ad2194c6756exeexeexeex.exe 1512 965ad2194c6756exeexeexeex.exe 1424 965ad2194c6756exeexeexeex.exe 1424 965ad2194c6756exeexeexeex.exe 1380 965ad2194c6756exeexeexeex.exe 1380 965ad2194c6756exeexeexeex.exe 1516 965ad2194c6756exeexeexeex.exe 1516 965ad2194c6756exeexeexeex.exe 1216 965ad2194c6756exeexeexeex.exe 1216 965ad2194c6756exeexeexeex.exe 2180 965ad2194c6756exeexeexeex.exe 2180 965ad2194c6756exeexeexeex.exe 2936 965ad2194c6756exeexeexeex.exe 2936 965ad2194c6756exeexeexeex.exe 2416 965ad2194c6756exeexeexeex.exe 2416 965ad2194c6756exeexeexeex.exe 2788 965ad2194c6756exeexeexeex.exe 2788 965ad2194c6756exeexeexeex.exe 2256 965ad2194c6756exeexeexeex.exe 2256 965ad2194c6756exeexeexeex.exe 888 965ad2194c6756exeexeexeex.exe 888 965ad2194c6756exeexeexeex.exe 572 965ad2194c6756exeexeexeex.exe 572 965ad2194c6756exeexeexeex.exe 2392 965ad2194c6756exeexeexeex.exe 2392 965ad2194c6756exeexeexeex.exe 2424 965ad2194c6756exeexeexeex.exe 2424 965ad2194c6756exeexeexeex.exe 2892 965ad2194c6756exeexeexeex.exe 2892 965ad2194c6756exeexeexeex.exe 680 965ad2194c6756exeexeexeex.exe 680 965ad2194c6756exeexeexeex.exe 744 965ad2194c6756exeexeexeex.exe 744 965ad2194c6756exeexeexeex.exe 2572 965ad2194c6756exeexeexeex.exe 2572 965ad2194c6756exeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1760 1344 965ad2194c6756exeexeexeex.exe 28 PID 1344 wrote to memory of 1760 1344 965ad2194c6756exeexeexeex.exe 28 PID 1344 wrote to memory of 1760 1344 965ad2194c6756exeexeexeex.exe 28 PID 1344 wrote to memory of 1760 1344 965ad2194c6756exeexeexeex.exe 28 PID 1344 wrote to memory of 2876 1344 965ad2194c6756exeexeexeex.exe 29 PID 1344 wrote to memory of 2876 1344 965ad2194c6756exeexeexeex.exe 29 PID 1344 wrote to memory of 2876 1344 965ad2194c6756exeexeexeex.exe 29 PID 1344 wrote to memory of 2876 1344 965ad2194c6756exeexeexeex.exe 29 PID 1344 wrote to memory of 1624 1344 965ad2194c6756exeexeexeex.exe 30 PID 1344 wrote to memory of 1624 1344 965ad2194c6756exeexeexeex.exe 30 PID 1344 wrote to memory of 1624 1344 965ad2194c6756exeexeexeex.exe 30 PID 1344 wrote to memory of 1624 1344 965ad2194c6756exeexeexeex.exe 30 PID 1624 wrote to memory of 1680 1624 cmd.exe 32 PID 1624 wrote to memory of 1680 1624 cmd.exe 32 PID 1624 wrote to memory of 1680 1624 cmd.exe 32 PID 1624 wrote to memory of 1680 1624 cmd.exe 32 PID 1344 wrote to memory of 2224 1344 965ad2194c6756exeexeexeex.exe 33 PID 1344 wrote to memory of 2224 1344 965ad2194c6756exeexeexeex.exe 33 PID 1344 wrote to memory of 2224 1344 965ad2194c6756exeexeexeex.exe 33 PID 1344 wrote to memory of 2224 1344 965ad2194c6756exeexeexeex.exe 33 PID 1344 wrote to memory of 1704 1344 965ad2194c6756exeexeexeex.exe 34 PID 1344 wrote to memory of 1704 1344 965ad2194c6756exeexeexeex.exe 34 PID 1344 wrote to memory of 1704 1344 965ad2194c6756exeexeexeex.exe 34 PID 1344 wrote to memory of 1704 1344 965ad2194c6756exeexeexeex.exe 34 PID 1344 wrote to memory of 2220 1344 965ad2194c6756exeexeexeex.exe 36 PID 1344 wrote to memory of 2220 1344 965ad2194c6756exeexeexeex.exe 36 PID 1344 wrote to memory of 2220 1344 965ad2194c6756exeexeexeex.exe 36 PID 1344 wrote to memory of 2220 1344 965ad2194c6756exeexeexeex.exe 36 PID 1344 wrote to memory of 3028 1344 965ad2194c6756exeexeexeex.exe 38 PID 1344 wrote to memory of 3028 1344 965ad2194c6756exeexeexeex.exe 38 PID 1344 wrote to memory of 3028 1344 965ad2194c6756exeexeexeex.exe 38 PID 1344 wrote to memory of 3028 1344 965ad2194c6756exeexeexeex.exe 38 PID 3028 wrote to memory of 2188 3028 cmd.exe 41 PID 3028 wrote to memory of 2188 3028 cmd.exe 41 PID 3028 wrote to memory of 2188 3028 cmd.exe 41 PID 3028 wrote to memory of 2188 3028 cmd.exe 41 PID 1680 wrote to memory of 2600 1680 965ad2194c6756exeexeexeex.exe 42 PID 1680 wrote to memory of 2600 1680 965ad2194c6756exeexeexeex.exe 42 PID 1680 wrote to memory of 2600 1680 965ad2194c6756exeexeexeex.exe 42 PID 1680 wrote to memory of 2600 1680 965ad2194c6756exeexeexeex.exe 42 PID 2600 wrote to memory of 2696 2600 cmd.exe 44 PID 2600 wrote to memory of 2696 2600 cmd.exe 44 PID 2600 wrote to memory of 2696 2600 cmd.exe 44 PID 2600 wrote to memory of 2696 2600 cmd.exe 44 PID 1680 wrote to memory of 2716 1680 965ad2194c6756exeexeexeex.exe 45 PID 1680 wrote to memory of 2716 1680 965ad2194c6756exeexeexeex.exe 45 PID 1680 wrote to memory of 2716 1680 965ad2194c6756exeexeexeex.exe 45 PID 1680 wrote to memory of 2716 1680 965ad2194c6756exeexeexeex.exe 45 PID 1680 wrote to memory of 2880 1680 965ad2194c6756exeexeexeex.exe 47 PID 1680 wrote to memory of 2880 1680 965ad2194c6756exeexeexeex.exe 47 PID 1680 wrote to memory of 2880 1680 965ad2194c6756exeexeexeex.exe 47 PID 1680 wrote to memory of 2880 1680 965ad2194c6756exeexeexeex.exe 47 PID 1680 wrote to memory of 2584 1680 965ad2194c6756exeexeexeex.exe 52 PID 1680 wrote to memory of 2584 1680 965ad2194c6756exeexeexeex.exe 52 PID 1680 wrote to memory of 2584 1680 965ad2194c6756exeexeexeex.exe 52 PID 1680 wrote to memory of 2584 1680 965ad2194c6756exeexeexeex.exe 52 PID 1680 wrote to memory of 2732 1680 965ad2194c6756exeexeexeex.exe 50 PID 1680 wrote to memory of 2732 1680 965ad2194c6756exeexeexeex.exe 50 PID 1680 wrote to memory of 2732 1680 965ad2194c6756exeexeexeex.exe 50 PID 1680 wrote to memory of 2732 1680 965ad2194c6756exeexeexeex.exe 50 PID 2732 wrote to memory of 2820 2732 cmd.exe 53 PID 2732 wrote to memory of 2820 2732 cmd.exe 53 PID 2732 wrote to memory of 2820 2732 cmd.exe 53 PID 2732 wrote to memory of 2820 2732 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AAgYAQos\AaoIAIUw.exe"C:\Users\Admin\AAgYAQos\AaoIAIUw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1760
-
-
C:\ProgramData\WOQEwkgM\tSAsQskI.exe"C:\ProgramData\WOQEwkgM\tSAsQskI.exe"2⤵
- Modifies extensions of user files
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
PID:2876
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"6⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"8⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"10⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"12⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"14⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"16⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"18⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"20⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"22⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"24⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
PID:908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"26⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"28⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"30⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"32⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"34⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"36⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"38⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"40⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"42⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"44⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"46⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"48⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"50⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
PID:572 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"52⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"54⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"56⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"58⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
PID:680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"60⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
PID:744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"62⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"64⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex65⤵PID:2176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"66⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex67⤵PID:1368
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"68⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex69⤵PID:1496
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"70⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex71⤵PID:2140
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"72⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex73⤵PID:2152
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"74⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex75⤵PID:676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"76⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex77⤵PID:1920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"78⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex79⤵PID:1088
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"80⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex81⤵PID:2484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"82⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex83⤵PID:2716
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"84⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex85⤵PID:1260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"86⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex87⤵PID:2044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"88⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex89⤵PID:1624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"90⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex91⤵PID:2204
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"92⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex93⤵PID:1684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"94⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex95⤵PID:1856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"96⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex97⤵PID:2324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"98⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex99⤵PID:2036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"100⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex101⤵PID:1624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"102⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex103⤵PID:1768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"104⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex105⤵PID:2372
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"106⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex107⤵PID:1488
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"108⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex109⤵PID:2280
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"110⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex111⤵PID:1956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"112⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex113⤵PID:832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"114⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex115⤵PID:3040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"116⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex117⤵PID:2072
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"118⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex119⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"120⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex121⤵PID:2060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\965ad2194c6756exeexeexeex"122⤵PID:2576
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-