Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
cc0aba20f7299856b64bb471442d784b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc0aba20f7299856b64bb471442d784b.exe
Resource
win10v2004-20240226-en
General
-
Target
cc0aba20f7299856b64bb471442d784b.exe
-
Size
484KB
-
MD5
cc0aba20f7299856b64bb471442d784b
-
SHA1
d2e72b45d5a6f08210469ed14960a8461b04a829
-
SHA256
88e29b165f22416dab1e54c1470b5c054ec666e3ba41b0c4b6b750d034e3f759
-
SHA512
cc93aa2c1a48b08230609a7084db165148d509203360968d7152b52b8c201e5949b6f5a7ad65677371dd399f493c1b3dcec2f819b46524fe673c287ba799124e
-
SSDEEP
12288:qpL0oRVMMIqjBah9pZgv8TzNDf9jyFQfDQtgUnx8EOW4:rJEBmH+v8FD1LUnx8EO
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (68) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\International\Geo\Nation aIgYMcYI.exe -
Deletes itself 1 IoCs
pid Process 1532 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1272 aIgYMcYI.exe 2224 aKsckAII.exe 2984 HcAkcoIo.exe -
Loads dropped DLL 22 IoCs
pid Process 1288 cc0aba20f7299856b64bb471442d784b.exe 1288 cc0aba20f7299856b64bb471442d784b.exe 1288 cc0aba20f7299856b64bb471442d784b.exe 1288 cc0aba20f7299856b64bb471442d784b.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\aIgYMcYI.exe = "C:\\Users\\Admin\\WYEQEwwk\\aIgYMcYI.exe" cc0aba20f7299856b64bb471442d784b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aKsckAII.exe = "C:\\ProgramData\\XUUkwIAk\\aKsckAII.exe" cc0aba20f7299856b64bb471442d784b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\aIgYMcYI.exe = "C:\\Users\\Admin\\WYEQEwwk\\aIgYMcYI.exe" aIgYMcYI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aKsckAII.exe = "C:\\ProgramData\\XUUkwIAk\\aKsckAII.exe" aKsckAII.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aKsckAII.exe = "C:\\ProgramData\\XUUkwIAk\\aKsckAII.exe" HcAkcoIo.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\WYEQEwwk HcAkcoIo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\WYEQEwwk\aIgYMcYI HcAkcoIo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2720 reg.exe 2124 reg.exe 1572 reg.exe 324 reg.exe 2828 reg.exe 2316 reg.exe 588 reg.exe 2052 reg.exe 3044 reg.exe 2596 reg.exe 840 reg.exe 2336 reg.exe 2420 reg.exe 1624 reg.exe 2824 reg.exe 2464 reg.exe 1812 reg.exe 1704 reg.exe 1292 reg.exe 1096 reg.exe 2036 reg.exe 1476 reg.exe 1068 reg.exe 3068 reg.exe 800 reg.exe 2384 reg.exe 452 reg.exe 1100 reg.exe 2324 reg.exe 1120 reg.exe 2404 reg.exe 2904 reg.exe 2752 reg.exe 2072 reg.exe 1636 reg.exe 2732 reg.exe 2688 reg.exe 2068 reg.exe 1508 reg.exe 2392 reg.exe 604 reg.exe 1120 reg.exe 596 reg.exe 2344 reg.exe 2740 reg.exe 2428 reg.exe 1732 reg.exe 2888 reg.exe 2360 reg.exe 1964 reg.exe 3064 reg.exe 2688 reg.exe 2544 reg.exe 1256 reg.exe 2776 reg.exe 2484 reg.exe 2384 reg.exe 2816 reg.exe 2332 reg.exe 2168 reg.exe 2780 reg.exe 2344 reg.exe 1520 reg.exe 2648 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1288 cc0aba20f7299856b64bb471442d784b.exe 1288 cc0aba20f7299856b64bb471442d784b.exe 2652 cc0aba20f7299856b64bb471442d784b.exe 2652 cc0aba20f7299856b64bb471442d784b.exe 1212 cc0aba20f7299856b64bb471442d784b.exe 1212 cc0aba20f7299856b64bb471442d784b.exe 1972 cc0aba20f7299856b64bb471442d784b.exe 1972 cc0aba20f7299856b64bb471442d784b.exe 2232 cc0aba20f7299856b64bb471442d784b.exe 2232 cc0aba20f7299856b64bb471442d784b.exe 3044 cc0aba20f7299856b64bb471442d784b.exe 3044 cc0aba20f7299856b64bb471442d784b.exe 996 cc0aba20f7299856b64bb471442d784b.exe 996 cc0aba20f7299856b64bb471442d784b.exe 2068 cc0aba20f7299856b64bb471442d784b.exe 2068 cc0aba20f7299856b64bb471442d784b.exe 2672 cc0aba20f7299856b64bb471442d784b.exe 2672 cc0aba20f7299856b64bb471442d784b.exe 1936 cc0aba20f7299856b64bb471442d784b.exe 1936 cc0aba20f7299856b64bb471442d784b.exe 2200 cc0aba20f7299856b64bb471442d784b.exe 2200 cc0aba20f7299856b64bb471442d784b.exe 1352 cc0aba20f7299856b64bb471442d784b.exe 1352 cc0aba20f7299856b64bb471442d784b.exe 1500 cc0aba20f7299856b64bb471442d784b.exe 1500 cc0aba20f7299856b64bb471442d784b.exe 2916 cc0aba20f7299856b64bb471442d784b.exe 2916 cc0aba20f7299856b64bb471442d784b.exe 1172 cc0aba20f7299856b64bb471442d784b.exe 1172 cc0aba20f7299856b64bb471442d784b.exe 2760 cc0aba20f7299856b64bb471442d784b.exe 2760 cc0aba20f7299856b64bb471442d784b.exe 1528 cc0aba20f7299856b64bb471442d784b.exe 1528 cc0aba20f7299856b64bb471442d784b.exe 1696 cc0aba20f7299856b64bb471442d784b.exe 1696 cc0aba20f7299856b64bb471442d784b.exe 2688 cc0aba20f7299856b64bb471442d784b.exe 2688 cc0aba20f7299856b64bb471442d784b.exe 2468 cc0aba20f7299856b64bb471442d784b.exe 2468 cc0aba20f7299856b64bb471442d784b.exe 3052 cc0aba20f7299856b64bb471442d784b.exe 3052 cc0aba20f7299856b64bb471442d784b.exe 2268 cc0aba20f7299856b64bb471442d784b.exe 2268 cc0aba20f7299856b64bb471442d784b.exe 3060 cc0aba20f7299856b64bb471442d784b.exe 3060 cc0aba20f7299856b64bb471442d784b.exe 2072 cc0aba20f7299856b64bb471442d784b.exe 2072 cc0aba20f7299856b64bb471442d784b.exe 1744 cc0aba20f7299856b64bb471442d784b.exe 1744 cc0aba20f7299856b64bb471442d784b.exe 904 cc0aba20f7299856b64bb471442d784b.exe 904 cc0aba20f7299856b64bb471442d784b.exe 2900 cc0aba20f7299856b64bb471442d784b.exe 2900 cc0aba20f7299856b64bb471442d784b.exe 1952 cc0aba20f7299856b64bb471442d784b.exe 1952 cc0aba20f7299856b64bb471442d784b.exe 2400 cc0aba20f7299856b64bb471442d784b.exe 2400 cc0aba20f7299856b64bb471442d784b.exe 2364 cc0aba20f7299856b64bb471442d784b.exe 2364 cc0aba20f7299856b64bb471442d784b.exe 2296 cc0aba20f7299856b64bb471442d784b.exe 2296 cc0aba20f7299856b64bb471442d784b.exe 2456 cc0aba20f7299856b64bb471442d784b.exe 2456 cc0aba20f7299856b64bb471442d784b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1272 aIgYMcYI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe 1272 aIgYMcYI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1272 1288 cc0aba20f7299856b64bb471442d784b.exe 28 PID 1288 wrote to memory of 1272 1288 cc0aba20f7299856b64bb471442d784b.exe 28 PID 1288 wrote to memory of 1272 1288 cc0aba20f7299856b64bb471442d784b.exe 28 PID 1288 wrote to memory of 1272 1288 cc0aba20f7299856b64bb471442d784b.exe 28 PID 1288 wrote to memory of 2224 1288 cc0aba20f7299856b64bb471442d784b.exe 29 PID 1288 wrote to memory of 2224 1288 cc0aba20f7299856b64bb471442d784b.exe 29 PID 1288 wrote to memory of 2224 1288 cc0aba20f7299856b64bb471442d784b.exe 29 PID 1288 wrote to memory of 2224 1288 cc0aba20f7299856b64bb471442d784b.exe 29 PID 1288 wrote to memory of 2708 1288 cc0aba20f7299856b64bb471442d784b.exe 31 PID 1288 wrote to memory of 2708 1288 cc0aba20f7299856b64bb471442d784b.exe 31 PID 1288 wrote to memory of 2708 1288 cc0aba20f7299856b64bb471442d784b.exe 31 PID 1288 wrote to memory of 2708 1288 cc0aba20f7299856b64bb471442d784b.exe 31 PID 2708 wrote to memory of 2652 2708 cmd.exe 33 PID 2708 wrote to memory of 2652 2708 cmd.exe 33 PID 2708 wrote to memory of 2652 2708 cmd.exe 33 PID 2708 wrote to memory of 2652 2708 cmd.exe 33 PID 1288 wrote to memory of 2460 1288 cc0aba20f7299856b64bb471442d784b.exe 34 PID 1288 wrote to memory of 2460 1288 cc0aba20f7299856b64bb471442d784b.exe 34 PID 1288 wrote to memory of 2460 1288 cc0aba20f7299856b64bb471442d784b.exe 34 PID 1288 wrote to memory of 2460 1288 cc0aba20f7299856b64bb471442d784b.exe 34 PID 1288 wrote to memory of 2764 1288 cc0aba20f7299856b64bb471442d784b.exe 35 PID 1288 wrote to memory of 2764 1288 cc0aba20f7299856b64bb471442d784b.exe 35 PID 1288 wrote to memory of 2764 1288 cc0aba20f7299856b64bb471442d784b.exe 35 PID 1288 wrote to memory of 2764 1288 cc0aba20f7299856b64bb471442d784b.exe 35 PID 1288 wrote to memory of 2340 1288 cc0aba20f7299856b64bb471442d784b.exe 37 PID 1288 wrote to memory of 2340 1288 cc0aba20f7299856b64bb471442d784b.exe 37 PID 1288 wrote to memory of 2340 1288 cc0aba20f7299856b64bb471442d784b.exe 37 PID 1288 wrote to memory of 2340 1288 cc0aba20f7299856b64bb471442d784b.exe 37 PID 2652 wrote to memory of 2884 2652 cc0aba20f7299856b64bb471442d784b.exe 40 PID 2652 wrote to memory of 2884 2652 cc0aba20f7299856b64bb471442d784b.exe 40 PID 2652 wrote to memory of 2884 2652 cc0aba20f7299856b64bb471442d784b.exe 40 PID 2652 wrote to memory of 2884 2652 cc0aba20f7299856b64bb471442d784b.exe 40 PID 2884 wrote to memory of 1212 2884 cmd.exe 42 PID 2884 wrote to memory of 1212 2884 cmd.exe 42 PID 2884 wrote to memory of 1212 2884 cmd.exe 42 PID 2884 wrote to memory of 1212 2884 cmd.exe 42 PID 2652 wrote to memory of 2344 2652 cc0aba20f7299856b64bb471442d784b.exe 43 PID 2652 wrote to memory of 2344 2652 cc0aba20f7299856b64bb471442d784b.exe 43 PID 2652 wrote to memory of 2344 2652 cc0aba20f7299856b64bb471442d784b.exe 43 PID 2652 wrote to memory of 2344 2652 cc0aba20f7299856b64bb471442d784b.exe 43 PID 2652 wrote to memory of 1648 2652 cc0aba20f7299856b64bb471442d784b.exe 44 PID 2652 wrote to memory of 1648 2652 cc0aba20f7299856b64bb471442d784b.exe 44 PID 2652 wrote to memory of 1648 2652 cc0aba20f7299856b64bb471442d784b.exe 44 PID 2652 wrote to memory of 1648 2652 cc0aba20f7299856b64bb471442d784b.exe 44 PID 2652 wrote to memory of 2420 2652 cc0aba20f7299856b64bb471442d784b.exe 47 PID 2652 wrote to memory of 2420 2652 cc0aba20f7299856b64bb471442d784b.exe 47 PID 2652 wrote to memory of 2420 2652 cc0aba20f7299856b64bb471442d784b.exe 47 PID 2652 wrote to memory of 2420 2652 cc0aba20f7299856b64bb471442d784b.exe 47 PID 2652 wrote to memory of 2616 2652 cc0aba20f7299856b64bb471442d784b.exe 49 PID 2652 wrote to memory of 2616 2652 cc0aba20f7299856b64bb471442d784b.exe 49 PID 2652 wrote to memory of 2616 2652 cc0aba20f7299856b64bb471442d784b.exe 49 PID 2652 wrote to memory of 2616 2652 cc0aba20f7299856b64bb471442d784b.exe 49 PID 2616 wrote to memory of 2904 2616 cmd.exe 51 PID 2616 wrote to memory of 2904 2616 cmd.exe 51 PID 2616 wrote to memory of 2904 2616 cmd.exe 51 PID 2616 wrote to memory of 2904 2616 cmd.exe 51 PID 1212 wrote to memory of 1068 1212 cc0aba20f7299856b64bb471442d784b.exe 52 PID 1212 wrote to memory of 1068 1212 cc0aba20f7299856b64bb471442d784b.exe 52 PID 1212 wrote to memory of 1068 1212 cc0aba20f7299856b64bb471442d784b.exe 52 PID 1212 wrote to memory of 1068 1212 cc0aba20f7299856b64bb471442d784b.exe 52 PID 1068 wrote to memory of 1972 1068 cmd.exe 54 PID 1068 wrote to memory of 1972 1068 cmd.exe 54 PID 1068 wrote to memory of 1972 1068 cmd.exe 54 PID 1068 wrote to memory of 1972 1068 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exe"C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\WYEQEwwk\aIgYMcYI.exe"C:\Users\Admin\WYEQEwwk\aIgYMcYI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1272
-
-
C:\ProgramData\XUUkwIAk\aKsckAII.exe"C:\ProgramData\XUUkwIAk\aKsckAII.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2224
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"2⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"4⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"6⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"8⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"10⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"12⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b13⤵
- Suspicious behavior: EnumeratesProcesses
PID:996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"14⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"16⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"18⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"20⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"22⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"24⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"26⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"28⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"30⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"32⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"34⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"36⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"38⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"40⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b41⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"42⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"44⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b45⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"46⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"48⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"50⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b51⤵
- Suspicious behavior: EnumeratesProcesses
PID:904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"52⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"54⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"56⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"58⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"60⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"62⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"64⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b65⤵PID:2896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"66⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b67⤵PID:1708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"68⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b69⤵PID:1436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"70⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b71⤵PID:2836
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"72⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b73⤵PID:2740
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"74⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b75⤵PID:2696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"76⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b77⤵PID:1596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"78⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b79⤵PID:1116
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"80⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b81⤵PID:1632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"82⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b83⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"84⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b85⤵PID:1708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"86⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b87⤵PID:3012
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"88⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b89⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"90⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b91⤵PID:964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"92⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b93⤵PID:2188
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"94⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b95⤵PID:2324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"96⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b97⤵PID:1964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"98⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b99⤵PID:404
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"100⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b101⤵PID:2120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"102⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b103⤵PID:548
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"104⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b105⤵PID:3040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"106⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b107⤵PID:1372
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"108⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b109⤵PID:2928
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"110⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b111⤵PID:2180
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"112⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b113⤵PID:2440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"114⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b115⤵PID:340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"116⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b117⤵PID:2068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"118⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b119⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"120⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b121⤵PID:1120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"122⤵PID:856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-