Analysis
-
max time kernel
149s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe
Resource
win10v2004-20220812-en
General
-
Target
aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe
-
Size
444KB
-
MD5
69be442bc04cf47b994946b206ef3fc0
-
SHA1
04c115e907cf1643e554ebac9108b28fa6948585
-
SHA256
aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199
-
SHA512
24cd6659ae5c5311bc30d199ba3c566db8d31daf01556fd30ffd0bf8faad8d7d653148ebc8fedc321efbf06fbf1d19f35c938a0ed8f7dc13d46650aee476f711
-
SSDEEP
6144:Ry3v47D28WZgwqii3V2SbS7DmGvFhb9cwdudaBL34fE6fHBZa9hiXkTLeZ:Ry3aD28yDqii3PGmGvrbAdaBLcZUHX+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" TrustedInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2460 xOQsoUIE.exe 5068 TEUEkUIs.exe 3748 QgYQQYok.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation xOQsoUIE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TEUEkUIs.exe = "C:\\ProgramData\\YmcIkYcI\\TEUEkUIs.exe" QgYQQYok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xOQsoUIE.exe = "C:\\Users\\Admin\\QkswUAwA\\xOQsoUIE.exe" aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xOQsoUIE.exe = "C:\\Users\\Admin\\QkswUAwA\\xOQsoUIE.exe" xOQsoUIE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TEUEkUIs.exe = "C:\\ProgramData\\YmcIkYcI\\TEUEkUIs.exe" aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TEUEkUIs.exe = "C:\\ProgramData\\YmcIkYcI\\TEUEkUIs.exe" TEUEkUIs.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheUnpublishUnprotect.docx xOQsoUIE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\QkswUAwA QgYQQYok.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\QkswUAwA\xOQsoUIE QgYQQYok.exe File created C:\Windows\SysWOW64\shell32.dll.exe xOQsoUIE.exe File opened for modification C:\Windows\SysWOW64\sheJoinPublish.bmp xOQsoUIE.exe File opened for modification C:\Windows\SysWOW64\sheResolveExit.rar xOQsoUIE.exe File opened for modification C:\Windows\SysWOW64\sheSearchExpand.doc xOQsoUIE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 3652 reg.exe 4556 reg.exe 4800 reg.exe 3132 reg.exe 1716 reg.exe 4212 reg.exe 1788 reg.exe 5056 Process not Found 2888 reg.exe 4824 reg.exe 2012 reg.exe 2500 reg.exe 2520 reg.exe 4516 reg.exe 3472 reg.exe 2888 reg.exe 1324 reg.exe 2332 reg.exe 3408 reg.exe 3132 reg.exe 1904 reg.exe 2520 reg.exe 2120 reg.exe 2536 reg.exe 4264 reg.exe 2888 reg.exe 2024 reg.exe 1916 reg.exe 5016 reg.exe 3640 reg.exe 2268 reg.exe 1756 reg.exe 3684 reg.exe 4368 reg.exe 1904 reg.exe 4768 reg.exe 4980 reg.exe 2464 reg.exe 4352 reg.exe 1400 reg.exe 3828 reg.exe 4280 reg.exe 4092 reg.exe 3228 reg.exe 320 reg.exe 3856 reg.exe 1904 reg.exe 3292 reg.exe 4524 reg.exe 3780 reg.exe 2148 reg.exe 3012 reg.exe 3632 reg.exe 1156 reg.exe 2648 reg.exe 4072 reg.exe 3636 reg.exe 228 reg.exe 3324 reg.exe 3932 reg.exe 4232 reg.exe 2256 reg.exe 932 reg.exe 2896 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4400 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4400 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4400 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4400 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 1280 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 1280 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 1280 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 1280 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3108 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3108 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3108 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3108 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3012 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3012 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3012 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3012 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3548 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3548 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3548 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3548 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4536 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4536 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4536 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4536 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 520 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 520 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 520 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 520 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3372 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3372 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3372 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3372 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4084 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4084 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4084 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 4084 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 1712 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 1712 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 1712 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 1712 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 2676 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 2676 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 2676 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 2676 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3032 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3032 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3032 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 3032 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 1688 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 1688 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 1688 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 1688 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 xOQsoUIE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2460 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 81 PID 2056 wrote to memory of 2460 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 81 PID 2056 wrote to memory of 2460 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 81 PID 2056 wrote to memory of 5068 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 82 PID 2056 wrote to memory of 5068 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 82 PID 2056 wrote to memory of 5068 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 82 PID 2056 wrote to memory of 4932 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 83 PID 2056 wrote to memory of 4932 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 83 PID 2056 wrote to memory of 4932 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 83 PID 2056 wrote to memory of 1312 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 91 PID 2056 wrote to memory of 1312 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 91 PID 2056 wrote to memory of 1312 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 91 PID 4932 wrote to memory of 4968 4932 cmd.exe 90 PID 4932 wrote to memory of 4968 4932 cmd.exe 90 PID 4932 wrote to memory of 4968 4932 cmd.exe 90 PID 2056 wrote to memory of 4188 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 89 PID 2056 wrote to memory of 4188 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 89 PID 2056 wrote to memory of 4188 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 89 PID 2056 wrote to memory of 4944 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 88 PID 2056 wrote to memory of 4944 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 88 PID 2056 wrote to memory of 4944 2056 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 88 PID 4968 wrote to memory of 2748 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 92 PID 4968 wrote to memory of 2748 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 92 PID 4968 wrote to memory of 2748 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 92 PID 4968 wrote to memory of 1304 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 94 PID 4968 wrote to memory of 1304 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 94 PID 4968 wrote to memory of 1304 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 94 PID 4968 wrote to memory of 1424 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 95 PID 4968 wrote to memory of 1424 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 95 PID 4968 wrote to memory of 1424 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 95 PID 4968 wrote to memory of 4432 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 96 PID 4968 wrote to memory of 4432 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 96 PID 4968 wrote to memory of 4432 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 96 PID 4968 wrote to memory of 652 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 97 PID 4968 wrote to memory of 652 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 97 PID 4968 wrote to memory of 652 4968 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 97 PID 2748 wrote to memory of 4312 2748 cmd.exe 98 PID 2748 wrote to memory of 4312 2748 cmd.exe 98 PID 2748 wrote to memory of 4312 2748 cmd.exe 98 PID 4312 wrote to memory of 4992 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 105 PID 4312 wrote to memory of 4992 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 105 PID 4312 wrote to memory of 4992 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 105 PID 4312 wrote to memory of 2148 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 106 PID 4312 wrote to memory of 2148 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 106 PID 4312 wrote to memory of 2148 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 106 PID 4312 wrote to memory of 3636 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 107 PID 4312 wrote to memory of 3636 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 107 PID 4312 wrote to memory of 3636 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 107 PID 4312 wrote to memory of 448 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 108 PID 4312 wrote to memory of 448 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 108 PID 4312 wrote to memory of 448 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 108 PID 4312 wrote to memory of 2096 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 109 PID 4312 wrote to memory of 2096 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 109 PID 4312 wrote to memory of 2096 4312 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 109 PID 4992 wrote to memory of 4400 4992 cmd.exe 115 PID 4992 wrote to memory of 4400 4992 cmd.exe 115 PID 4992 wrote to memory of 4400 4992 cmd.exe 115 PID 4400 wrote to memory of 1328 4400 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 117 PID 4400 wrote to memory of 1328 4400 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 117 PID 4400 wrote to memory of 1328 4400 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 117 PID 4400 wrote to memory of 4008 4400 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 119 PID 4400 wrote to memory of 4008 4400 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 119 PID 4400 wrote to memory of 4008 4400 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 119 PID 4400 wrote to memory of 4348 4400 aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe 127 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe"C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\QkswUAwA\xOQsoUIE.exe"C:\Users\Admin\QkswUAwA\xOQsoUIE.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:2460
-
-
C:\ProgramData\YmcIkYcI\TEUEkUIs.exe"C:\ProgramData\YmcIkYcI\TEUEkUIs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"2⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e02951993⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"4⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e02951995⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"6⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e02951997⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"8⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e02951999⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"10⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519911⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"12⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519913⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"14⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519915⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"16⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519917⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"18⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519919⤵
- Suspicious behavior: EnumeratesProcesses
PID:520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"20⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519921⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"22⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519923⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"24⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519925⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"26⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519927⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"28⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519929⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"30⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519931⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"32⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519933⤵PID:560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"34⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519935⤵PID:3944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"36⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519937⤵PID:1360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"38⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519939⤵PID:1316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"40⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519941⤵PID:2156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"42⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519943⤵PID:3224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"44⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519945⤵PID:3792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"46⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519947⤵PID:2296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"48⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519949⤵PID:3192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"50⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519951⤵PID:1304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"52⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519953⤵PID:2176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"54⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519955⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"56⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519957⤵PID:2824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"58⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519959⤵PID:4656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"60⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519961⤵PID:4252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"62⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519963⤵PID:1012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"64⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519965⤵PID:4552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"66⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519967⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"68⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519969⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"70⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519971⤵PID:2880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"72⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519973⤵PID:5112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"74⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519975⤵PID:4772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"76⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519977⤵PID:3192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"78⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519979⤵PID:2148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"80⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519981⤵PID:2920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"82⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519983⤵PID:4588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"84⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519985⤵PID:1084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"86⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519987⤵PID:4492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"88⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519989⤵PID:1508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"90⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519991⤵PID:4636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"92⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519993⤵PID:4568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"94⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519995⤵PID:2476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"96⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519997⤵PID:1900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"98⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e029519999⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"100⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199101⤵PID:312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"102⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199103⤵PID:4232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"104⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199105⤵PID:2024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"106⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199107⤵PID:3780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"108⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199109⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"110⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199111⤵PID:3644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"112⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199113⤵PID:216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"114⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199115⤵PID:4984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"116⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199117⤵PID:3264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"118⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199119⤵PID:1304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"120⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199.exeC:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199121⤵PID:480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aaf8b6e1b16e202a3e6f41ab58b176974f2526412d0c1f6dd6fc34a7e0295199"122⤵PID:3780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-