Analysis
-
max time kernel
190s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 18:45
Static task
static1
Behavioral task
behavioral1
Sample
7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe
Resource
win10v2004-20220812-en
General
-
Target
7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe
-
Size
465KB
-
MD5
69e8f1c4b3895768e91d4a466f78bcb0
-
SHA1
42b8b8613db7462fde9d6d5c5a483033ece10969
-
SHA256
7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341
-
SHA512
6a099951e4dd3e828279629f3ad2b5a53434c74fbf9a8f01b512909a52fd789a371805dacaca69cd7303a088e1a015804519d1617e9519180903e134fae2019f
-
SSDEEP
12288:zQuawXWkQGWkLyZYrhRwngXdht5Uas4xELN3iNc:z4wmb1kLPr3wgLPU7gELxMc
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4424 ryQQUEAI.exe 4808 eOkEokoQ.exe 4792 WoAMEYUU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\eOkEokoQ.exe = "C:\\ProgramData\\uUowwUIE\\eOkEokoQ.exe" eOkEokoQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\eOkEokoQ.exe = "C:\\ProgramData\\uUowwUIE\\eOkEokoQ.exe" WoAMEYUU.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GUsQEMco.exe = "C:\\Users\\Admin\\baQcEMMk\\GUsQEMco.exe" 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gmMgcIIw.exe = "C:\\ProgramData\\SMgIwYko\\gmMgcIIw.exe" 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ryQQUEAI.exe = "C:\\Users\\Admin\\gqMggAck\\ryQQUEAI.exe" 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ryQQUEAI.exe = "C:\\Users\\Admin\\gqMggAck\\ryQQUEAI.exe" ryQQUEAI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\eOkEokoQ.exe = "C:\\ProgramData\\uUowwUIE\\eOkEokoQ.exe" 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\gqMggAck\ryQQUEAI WoAMEYUU.exe File created C:\Windows\SysWOW64\shell32.dll.exe ryQQUEAI.exe File opened for modification C:\Windows\SysWOW64\sheSetConnect.jpg ryQQUEAI.exe File opened for modification C:\Windows\SysWOW64\sheSetDisable.ppt ryQQUEAI.exe File opened for modification C:\Windows\SysWOW64\sheUnpublishGroup.jpg ryQQUEAI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\gqMggAck WoAMEYUU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4148 3296 WerFault.exe 1578 644 1340 WerFault.exe 1576 5032 1084 WerFault.exe 1581 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 4280 reg.exe 1352 Process not Found 5008 reg.exe 2136 reg.exe 4504 reg.exe 1072 reg.exe 1168 reg.exe 2760 reg.exe 1732 Process not Found 4856 Process not Found 3476 reg.exe 1816 reg.exe 5116 reg.exe 3416 reg.exe 2108 reg.exe 3912 Process not Found 3968 Process not Found 3292 Process not Found 2520 reg.exe 2184 reg.exe 2548 reg.exe 3604 reg.exe 1344 reg.exe 4228 Process not Found 2680 Process not Found 1344 Process not Found 3504 reg.exe 3292 reg.exe 4080 reg.exe 480 reg.exe 3664 reg.exe 1952 reg.exe 1592 reg.exe 3872 reg.exe 2580 reg.exe 2448 reg.exe 4020 reg.exe 3088 reg.exe 448 Process not Found 2400 Process not Found 3132 reg.exe 4688 reg.exe 4964 reg.exe 816 reg.exe 4884 Process not Found 4912 reg.exe 3704 reg.exe 2084 reg.exe 4544 Process not Found 4560 reg.exe 4116 reg.exe 2468 Process not Found 2172 reg.exe 5116 reg.exe 224 reg.exe 1884 reg.exe 1400 reg.exe 4688 Process not Found 3932 Process not Found 2120 Process not Found 2708 reg.exe 3912 reg.exe 620 reg.exe 3616 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3476 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3476 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3476 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3476 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3012 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3012 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3012 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3012 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1824 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1824 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1824 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1824 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 968 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 968 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 968 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 968 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1504 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1504 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1504 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1504 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1592 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1592 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1592 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1592 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 2692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 2692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 2692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 2692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 2468 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 2468 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 2468 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 2468 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1660 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1660 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1660 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1660 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1388 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1388 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1388 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 1388 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3080 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3080 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3080 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3080 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3844 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3844 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3844 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 3844 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 2924 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 2924 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 2924 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 2924 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3856 wrote to memory of 4424 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 81 PID 3856 wrote to memory of 4424 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 81 PID 3856 wrote to memory of 4424 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 81 PID 3856 wrote to memory of 4808 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 82 PID 3856 wrote to memory of 4808 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 82 PID 3856 wrote to memory of 4808 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 82 PID 3856 wrote to memory of 5044 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 84 PID 3856 wrote to memory of 5044 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 84 PID 3856 wrote to memory of 5044 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 84 PID 3856 wrote to memory of 4500 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 85 PID 3856 wrote to memory of 4500 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 85 PID 3856 wrote to memory of 4500 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 85 PID 3856 wrote to memory of 2028 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 91 PID 3856 wrote to memory of 2028 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 91 PID 3856 wrote to memory of 2028 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 91 PID 3856 wrote to memory of 2596 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 90 PID 3856 wrote to memory of 2596 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 90 PID 3856 wrote to memory of 2596 3856 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 90 PID 5044 wrote to memory of 692 5044 cmd.exe 92 PID 5044 wrote to memory of 692 5044 cmd.exe 92 PID 5044 wrote to memory of 692 5044 cmd.exe 92 PID 692 wrote to memory of 3700 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 94 PID 692 wrote to memory of 3700 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 94 PID 692 wrote to memory of 3700 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 94 PID 3700 wrote to memory of 3076 3700 cmd.exe 95 PID 3700 wrote to memory of 3076 3700 cmd.exe 95 PID 3700 wrote to memory of 3076 3700 cmd.exe 95 PID 692 wrote to memory of 224 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 96 PID 692 wrote to memory of 224 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 96 PID 692 wrote to memory of 224 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 96 PID 692 wrote to memory of 1288 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 103 PID 692 wrote to memory of 1288 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 103 PID 692 wrote to memory of 1288 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 103 PID 692 wrote to memory of 3896 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 101 PID 692 wrote to memory of 3896 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 101 PID 692 wrote to memory of 3896 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 101 PID 692 wrote to memory of 1072 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 100 PID 692 wrote to memory of 1072 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 100 PID 692 wrote to memory of 1072 692 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 100 PID 3076 wrote to memory of 4704 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 105 PID 3076 wrote to memory of 4704 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 105 PID 3076 wrote to memory of 4704 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 105 PID 4704 wrote to memory of 3476 4704 cmd.exe 106 PID 4704 wrote to memory of 3476 4704 cmd.exe 106 PID 4704 wrote to memory of 3476 4704 cmd.exe 106 PID 3076 wrote to memory of 4024 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 107 PID 3076 wrote to memory of 4024 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 107 PID 3076 wrote to memory of 4024 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 107 PID 3076 wrote to memory of 3564 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 114 PID 3076 wrote to memory of 3564 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 114 PID 3076 wrote to memory of 3564 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 114 PID 3076 wrote to memory of 3996 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 112 PID 3076 wrote to memory of 3996 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 112 PID 3076 wrote to memory of 3996 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 112 PID 3076 wrote to memory of 3748 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 109 PID 3076 wrote to memory of 3748 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 109 PID 3076 wrote to memory of 3748 3076 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 109 PID 3476 wrote to memory of 3708 3476 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 116 PID 3476 wrote to memory of 3708 3476 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 116 PID 3476 wrote to memory of 3708 3476 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 116 PID 3476 wrote to memory of 5068 3476 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 117 PID 3476 wrote to memory of 5068 3476 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 117 PID 3476 wrote to memory of 5068 3476 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 117 PID 3476 wrote to memory of 4420 3476 7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe 124 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe"C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\gqMggAck\ryQQUEAI.exe"C:\Users\Admin\gqMggAck\ryQQUEAI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4424
-
-
C:\ProgramData\uUowwUIE\eOkEokoQ.exe"C:\ProgramData\uUowwUIE\eOkEokoQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"2⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43413⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"4⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43415⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"6⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43417⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"8⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43419⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"10⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434111⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"12⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434113⤵
- Suspicious behavior: EnumeratesProcesses
PID:968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"14⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434115⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"16⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434117⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"18⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434119⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"20⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434121⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"22⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434123⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"24⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434125⤵
- Suspicious behavior: EnumeratesProcesses
PID:1388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"26⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434127⤵
- Suspicious behavior: EnumeratesProcesses
PID:3080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"28⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434129⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"30⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434131⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"32⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434133⤵PID:3424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"34⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434135⤵PID:4576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"36⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434137⤵PID:4940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"38⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434139⤵PID:1384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"40⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434141⤵PID:3416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"42⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434143⤵PID:1424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"44⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434145⤵PID:1300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"46⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434147⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"48⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434149⤵PID:3968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"50⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434151⤵PID:3500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"52⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434153⤵PID:1340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rGIEooQs.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""52⤵PID:920
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵PID:3996
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵PID:3496
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵PID:936
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:1536
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FKYoEkYs.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""50⤵PID:3904
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- UAC bypass
- Modifies registry key
PID:4912
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵PID:2208
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵PID:4548
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gywcEAQs.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""48⤵PID:2104
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵PID:2088
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵PID:4916
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵PID:4824
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵PID:4104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yAQkoEEM.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""46⤵PID:1560
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵PID:2792
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵PID:3924
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵PID:1576
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rOcAQUAc.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""44⤵PID:1624
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵PID:4460
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵PID:5072
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵
- Modifies registry key
PID:2448
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies visibility of file extensions in Explorer
PID:672
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QeEwMIUg.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""42⤵PID:972
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵PID:1840
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- UAC bypass
PID:3972
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵PID:1156
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵PID:4960
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SeoMEokE.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""40⤵PID:4776
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵PID:3700
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- UAC bypass
PID:3364
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵PID:1828
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies visibility of file extensions in Explorer
PID:116
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XoocEccs.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""38⤵PID:3176
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵PID:1984
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
- UAC bypass
PID:4688
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵
- Modifies registry key
PID:1952
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵PID:4912
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OQskgIsI.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""36⤵PID:2456
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:5056
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵PID:4932
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵PID:1028
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies visibility of file extensions in Explorer
PID:2864
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵PID:556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xgsIsIIE.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""34⤵PID:1592
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:4380
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵PID:4556
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵PID:5040
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵PID:1796
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵PID:1884
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- UAC bypass
PID:4344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NEgAsMYc.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""32⤵PID:2232
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:4976
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs34⤵PID:4600
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OiIcAEQk.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""30⤵PID:3872
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:3704
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵PID:456
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵PID:4940
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵PID:3392
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵PID:1188
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:2792
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵PID:1836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EQQscUEk.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""28⤵PID:2956
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:2768
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵PID:3580
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- UAC bypass
PID:3176
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵PID:1704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WCsoAsgI.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""26⤵PID:4560
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:3232
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies registry key
PID:1884
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵PID:1256
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- Modifies registry key
PID:5008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dQcYEAEE.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""24⤵PID:4804
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:4736
-
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV123⤵PID:3844
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵PID:1656
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵PID:4408
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
PID:4616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cOYkMYMQ.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""22⤵PID:1712
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:3016
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pGIYcswM.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""20⤵PID:1708
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:2040
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
- Modifies registry key
PID:3132
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:3144
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2184
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵PID:3656
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵PID:3476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jKoUwQMg.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""18⤵PID:4524
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:3296
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- UAC bypass
PID:4840
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
PID:224
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵PID:3064
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵PID:3716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YsMYQsUI.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""16⤵PID:2172
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:3996
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies registry key
PID:2520
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵PID:3976
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵PID:4068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XSgcwogg.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""14⤵PID:3056
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:3832
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CQcMwgEI.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""12⤵PID:1772
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:1828
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵PID:672
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
PID:4972
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵PID:4084
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:3664
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:4460
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵PID:2300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HuwAYsko.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""10⤵PID:4948
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:4192
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵PID:5068
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
PID:2760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hMwAEkso.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""8⤵PID:4744
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:2900
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:4420
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵PID:4024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BYkQsQUc.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""6⤵PID:3748
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:1936
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵PID:3996
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:3564
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NiAwcAQA.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""4⤵PID:1072
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:3496
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵PID:3896
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:1288
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:4500
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:2596
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:2028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PQQAAksU.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""2⤵PID:2672
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:2456
-
-
-
C:\ProgramData\qOQgwgkk\WoAMEYUU.exeC:\ProgramData\qOQgwgkk\WoAMEYUU.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4792
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2108
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3552
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1952
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"1⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43412⤵PID:2188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"3⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43414⤵PID:2640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"5⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43416⤵PID:4560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"7⤵PID:3136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wocAwIMQ.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""7⤵PID:4044
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f7⤵PID:260
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 27⤵PID:3460
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 17⤵PID:4188
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵PID:2232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FOEgscQI.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""5⤵PID:3848
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs6⤵PID:1848
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵PID:2680
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵PID:4944
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FAAYAAQs.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""3⤵PID:2540
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:3180
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:1424
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:3140
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:3604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ICgMQkwo.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""1⤵PID:4976
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:2140
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:1112
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43411⤵PID:2792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"2⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43413⤵PID:3716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"4⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43415⤵PID:3632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EYAgscgk.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""6⤵PID:5068
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:4532
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- Modifies registry key
PID:3476
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:3232
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
PID:2932
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵PID:4124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GmwMUAsg.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""4⤵PID:4800
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:3508
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5068
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:2924
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:2456
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HiEMUAYg.bat" "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exe""2⤵PID:3708
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:1536
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:1592
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4176
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:2692
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1028
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4916
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1716
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2700
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2088
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"1⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43412⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"3⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43414⤵PID:2120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"5⤵PID:2184
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- UAC bypass
PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43416⤵PID:2680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"7⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f43418⤵PID:2400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"9⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434110⤵PID:5112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"11⤵PID:2036
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵
- UAC bypass
PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434112⤵PID:3528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"13⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434114⤵PID:2416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"15⤵PID:3432
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434116⤵PID:3572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"17⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434118⤵PID:4120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"19⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434120⤵PID:1168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"21⤵PID:4876
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV122⤵PID:4080
-
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434122⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"23⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434124⤵PID:3956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"25⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434126⤵
- Modifies visibility of file extensions in Explorer
PID:936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"27⤵PID:2208
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV128⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434128⤵PID:2768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"29⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434130⤵PID:1368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"31⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434132⤵PID:3388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"33⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434134⤵PID:868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"35⤵PID:1716
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV136⤵PID:3924
-
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434136⤵PID:240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"37⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434138⤵PID:384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"39⤵PID:2428
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV140⤵PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434140⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"41⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434142⤵PID:780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"43⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434144⤵PID:4136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"45⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434146⤵PID:4216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"47⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434148⤵PID:1300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"49⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434150⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"51⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434152⤵PID:3632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"53⤵PID:1340
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV154⤵
- Modifies visibility of file extensions in Explorer
PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434154⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"55⤵PID:480
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV156⤵PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434156⤵PID:4192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"57⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434158⤵PID:4228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"59⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434160⤵PID:3664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"61⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434162⤵PID:1368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"63⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434164⤵PID:3052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"65⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434166⤵PID:4244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"67⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434168⤵PID:2576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"69⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434170⤵PID:2900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"71⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434172⤵PID:3960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"73⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434174⤵PID:4120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"75⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434176⤵PID:2376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"77⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434178⤵PID:4180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"79⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434180⤵PID:2140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"81⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434182⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"83⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434184⤵PID:4304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"85⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434186⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"87⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434188⤵PID:2128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"89⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434190⤵PID:1048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"91⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434192⤵PID:2932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"93⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434194⤵PID:1108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"95⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434196⤵PID:4232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"97⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f434198⤵PID:3644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"99⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341100⤵PID:1388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"101⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341102⤵PID:2232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"103⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341104⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"105⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341106⤵PID:332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"107⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341108⤵PID:2236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"109⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341110⤵PID:5068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"111⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341112⤵PID:4548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"113⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341114⤵PID:3024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"115⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341116⤵PID:3244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"117⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341118⤵PID:3604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"119⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341120⤵PID:2028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341"121⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341.exeC:\Users\Admin\AppData\Local\Temp\7ef84df760a77fc6632ac82069530ea18a9f356bf94951d11bf2c5297e2f4341122⤵PID:2524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-