Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe
Resource
win10v2004-20220901-en
General
-
Target
36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe
-
Size
449KB
-
MD5
4bf4763daa0f973efe63c801aa005f80
-
SHA1
00a705118626a6c3d989fd690a1f59e556878f2e
-
SHA256
36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc
-
SHA512
dad551f9e958bcad30293f5eeba8c42e30256e9288c9dfdff9241629696f7565dc8b060d7c80f49df36ac48f2561ac468e736b6c064cbd82cf1c71db7c431adb
-
SSDEEP
6144:2hCtOc+rdxDtB/TCyrJs5z2saX/fQQ8TdUiQjkwJMtMFtYRtk+Ob5MXAqDpjF2qL:2hECzv7x+5HCfQBd3Qj7M6FdRanj/L
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 3260 CmEsggkE.exe 3656 GEogAYUQ.exe 2624 vyMsUIMs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation GEogAYUQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CmEsggkE.exe = "C:\\Users\\Admin\\moEIAMAg\\CmEsggkE.exe" 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GEogAYUQ.exe = "C:\\ProgramData\\WIcAUgYI\\GEogAYUQ.exe" 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CmEsggkE.exe = "C:\\Users\\Admin\\moEIAMAg\\CmEsggkE.exe" CmEsggkE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GEogAYUQ.exe = "C:\\ProgramData\\WIcAUgYI\\GEogAYUQ.exe" GEogAYUQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GEogAYUQ.exe = "C:\\ProgramData\\WIcAUgYI\\GEogAYUQ.exe" vyMsUIMs.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe GEogAYUQ.exe File opened for modification C:\Windows\SysWOW64\sheImportResume.pptm GEogAYUQ.exe File opened for modification C:\Windows\SysWOW64\sheSkipInstall.docx GEogAYUQ.exe File opened for modification C:\Windows\SysWOW64\sheSubmitReset.jpeg GEogAYUQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\moEIAMAg vyMsUIMs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\moEIAMAg\CmEsggkE vyMsUIMs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4784 reg.exe 2636 reg.exe 4860 reg.exe 4316 reg.exe 732 reg.exe 1056 reg.exe 2884 reg.exe 4500 reg.exe 948 reg.exe 1352 reg.exe 4444 reg.exe 1868 reg.exe 1492 reg.exe 4416 reg.exe 4328 reg.exe 5044 reg.exe 4112 reg.exe 3680 reg.exe 4772 reg.exe 4772 reg.exe 1304 reg.exe 1736 reg.exe 3788 reg.exe 4432 reg.exe 1736 reg.exe 5072 reg.exe 4860 reg.exe 4020 reg.exe 4332 reg.exe 2636 reg.exe 1328 reg.exe 3252 reg.exe 4904 reg.exe 840 reg.exe 3156 reg.exe 4440 reg.exe 4200 reg.exe 1960 reg.exe 2124 reg.exe 5064 reg.exe 4200 reg.exe 400 reg.exe 380 reg.exe 2632 reg.exe 4020 reg.exe 4852 reg.exe 1480 reg.exe 444 reg.exe 4288 reg.exe 1492 reg.exe 4192 reg.exe 1960 reg.exe 3136 reg.exe 3004 reg.exe 4328 reg.exe 2004 reg.exe 736 reg.exe 4872 reg.exe 2844 reg.exe 4632 reg.exe 2220 reg.exe 4052 reg.exe 4692 reg.exe 2436 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 1148 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 1148 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 1148 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 1148 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3792 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3792 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3792 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3792 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4404 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4404 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4404 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4404 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 2320 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 2320 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 2320 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 2320 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 484 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 484 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 484 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 484 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 5000 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 5000 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 5000 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 5000 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3508 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3508 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3508 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3508 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3412 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3412 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3412 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 3412 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4208 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4208 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4208 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4208 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 1640 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 1640 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 1640 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 1640 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4700 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4700 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4700 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4700 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4832 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4832 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4832 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 4832 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 1512 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 1512 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 1512 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 1512 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3656 GEogAYUQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe 3656 GEogAYUQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 3260 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 84 PID 2260 wrote to memory of 3260 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 84 PID 2260 wrote to memory of 3260 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 84 PID 2260 wrote to memory of 3656 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 85 PID 2260 wrote to memory of 3656 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 85 PID 2260 wrote to memory of 3656 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 85 PID 2260 wrote to memory of 3772 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 87 PID 2260 wrote to memory of 3772 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 87 PID 2260 wrote to memory of 3772 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 87 PID 2260 wrote to memory of 4432 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 89 PID 2260 wrote to memory of 4432 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 89 PID 2260 wrote to memory of 4432 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 89 PID 2260 wrote to memory of 732 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 95 PID 2260 wrote to memory of 732 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 95 PID 2260 wrote to memory of 732 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 95 PID 3772 wrote to memory of 3084 3772 cmd.exe 91 PID 3772 wrote to memory of 3084 3772 cmd.exe 91 PID 3772 wrote to memory of 3084 3772 cmd.exe 91 PID 2260 wrote to memory of 540 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 92 PID 2260 wrote to memory of 540 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 92 PID 2260 wrote to memory of 540 2260 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 92 PID 3084 wrote to memory of 1352 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 96 PID 3084 wrote to memory of 1352 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 96 PID 3084 wrote to memory of 1352 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 96 PID 1352 wrote to memory of 3684 1352 cmd.exe 98 PID 1352 wrote to memory of 3684 1352 cmd.exe 98 PID 1352 wrote to memory of 3684 1352 cmd.exe 98 PID 3084 wrote to memory of 1296 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 99 PID 3084 wrote to memory of 1296 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 99 PID 3084 wrote to memory of 1296 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 99 PID 3084 wrote to memory of 1492 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 100 PID 3084 wrote to memory of 1492 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 100 PID 3084 wrote to memory of 1492 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 100 PID 3084 wrote to memory of 1868 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 105 PID 3084 wrote to memory of 1868 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 105 PID 3084 wrote to memory of 1868 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 105 PID 3084 wrote to memory of 4644 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 103 PID 3084 wrote to memory of 4644 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 103 PID 3084 wrote to memory of 4644 3084 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 103 PID 4644 wrote to memory of 1328 4644 cmd.exe 107 PID 4644 wrote to memory of 1328 4644 cmd.exe 107 PID 4644 wrote to memory of 1328 4644 cmd.exe 107 PID 3684 wrote to memory of 4964 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 108 PID 3684 wrote to memory of 4964 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 108 PID 3684 wrote to memory of 4964 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 108 PID 4964 wrote to memory of 1148 4964 cmd.exe 111 PID 3684 wrote to memory of 924 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 110 PID 4964 wrote to memory of 1148 4964 cmd.exe 111 PID 4964 wrote to memory of 1148 4964 cmd.exe 111 PID 3684 wrote to memory of 924 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 110 PID 3684 wrote to memory of 924 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 110 PID 3684 wrote to memory of 2984 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 112 PID 3684 wrote to memory of 2984 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 112 PID 3684 wrote to memory of 2984 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 112 PID 3684 wrote to memory of 4656 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 113 PID 3684 wrote to memory of 4656 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 113 PID 3684 wrote to memory of 4656 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 113 PID 3684 wrote to memory of 3716 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 116 PID 3684 wrote to memory of 3716 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 116 PID 3684 wrote to memory of 3716 3684 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 116 PID 1148 wrote to memory of 4300 1148 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 119 PID 1148 wrote to memory of 4300 1148 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 119 PID 1148 wrote to memory of 4300 1148 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 119 PID 1148 wrote to memory of 4632 1148 36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe 121 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe"C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\moEIAMAg\CmEsggkE.exe"C:\Users\Admin\moEIAMAg\CmEsggkE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3260
-
-
C:\ProgramData\WIcAUgYI\GEogAYUQ.exe"C:\ProgramData\WIcAUgYI\GEogAYUQ.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"2⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"4⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"6⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"8⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"10⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"12⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"14⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc15⤵
- Suspicious behavior: EnumeratesProcesses
PID:484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"16⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc17⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"18⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"20⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"22⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"24⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"26⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"28⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"30⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"32⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc33⤵PID:448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"34⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc35⤵PID:2984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"36⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc37⤵PID:4868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"38⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc39⤵PID:4080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"40⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc41⤵PID:5008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"42⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc43⤵PID:3564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"44⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc45⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"46⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc47⤵PID:404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"48⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc49⤵PID:3216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"50⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc51⤵PID:3724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"52⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc53⤵PID:1828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"54⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc55⤵PID:1576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"56⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc57⤵PID:4208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"58⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc59⤵PID:1532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"60⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc61⤵PID:3144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"62⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc63⤵PID:2332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"64⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc65⤵PID:1876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"66⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc67⤵PID:4156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"68⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc69⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"70⤵PID:3752
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵
- Modifies visibility of file extensions in Explorer
PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc71⤵PID:3144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"72⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc73⤵PID:2508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"74⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc75⤵PID:572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"76⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc77⤵PID:972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"78⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc79⤵PID:2432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"80⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc81⤵PID:2348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"82⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc83⤵PID:4692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"84⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc85⤵PID:3252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"86⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc87⤵PID:1560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"88⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc89⤵PID:4440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"90⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc91⤵PID:4412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"92⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc93⤵PID:3780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"94⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc95⤵PID:2264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"96⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc97⤵PID:1340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"98⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc99⤵PID:572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"100⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc101⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"102⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc103⤵PID:732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"104⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc105⤵PID:4252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"106⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc107⤵PID:984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"108⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc109⤵PID:2140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"110⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc111⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"112⤵
- Modifies visibility of file extensions in Explorer
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc113⤵PID:4508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"114⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc115⤵PID:4784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"116⤵PID:4180
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:3800
-
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc117⤵PID:2296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"118⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc119⤵PID:2124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"120⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc.exeC:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc121⤵PID:484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\36d93b35a133e19b55d06d1e706d97535817a22658454e56183b0d0a8af0f4bc"122⤵PID:3688
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-