Analysis
-
max time kernel
188s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 11:40
Static task
static1
Behavioral task
behavioral1
Sample
5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe
Resource
win10v2004-20220812-en
General
-
Target
5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe
-
Size
447KB
-
MD5
410c4210eff3a61dd396b61305e567c0
-
SHA1
dc1dccb7e8ef3612c55d41666fc393eb05c6ebfa
-
SHA256
5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286
-
SHA512
ca2f4c4e6417cdb94c2f15f2ab191a58efe0ce7b8cc8c11ed9628367195cf826e83adfc59922b97b71186fb56c9c375c7727f68b9a5acdec9321377a31dea3ad
-
SSDEEP
12288:QhXq+t23PiVPDQOALPCyo79IJNin9g+6KMAnmyM:Qh32/iVPU1hoaJNS9TXfDM
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe -
Executes dropped EXE 3 IoCs
pid Process 4540 JiUkUAwQ.exe 1392 wwMccQIk.exe 2128 QkgEQIcI.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation wwMccQIk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JiUkUAwQ.exe = "C:\\Users\\Admin\\RYQcIogw\\JiUkUAwQ.exe" 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JiUkUAwQ.exe = "C:\\Users\\Admin\\RYQcIogw\\JiUkUAwQ.exe" JiUkUAwQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wwMccQIk.exe = "C:\\ProgramData\\DYgkMMoM\\wwMccQIk.exe" 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wwMccQIk.exe = "C:\\ProgramData\\DYgkMMoM\\wwMccQIk.exe" wwMccQIk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wwMccQIk.exe = "C:\\ProgramData\\DYgkMMoM\\wwMccQIk.exe" QkgEQIcI.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\RYQcIogw QkgEQIcI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\RYQcIogw\JiUkUAwQ QkgEQIcI.exe File created C:\Windows\SysWOW64\shell32.dll.exe wwMccQIk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4916 reg.exe 1544 reg.exe 4968 reg.exe 4756 reg.exe 1828 reg.exe 3108 reg.exe 2140 reg.exe 4064 reg.exe 4912 reg.exe 3632 reg.exe 4060 reg.exe 2580 reg.exe 2804 reg.exe 4892 reg.exe 4980 reg.exe 1372 reg.exe 3532 reg.exe 1556 Process not Found 524 reg.exe 4604 reg.exe 4816 reg.exe 3420 reg.exe 4816 reg.exe 3928 reg.exe 4344 reg.exe 4984 reg.exe 4940 reg.exe 4640 reg.exe 3592 reg.exe 4640 reg.exe 3136 reg.exe 4900 reg.exe 4124 reg.exe 4660 reg.exe 620 reg.exe 4052 reg.exe 4708 reg.exe 4824 reg.exe 1280 reg.exe 1624 reg.exe 4892 reg.exe 4220 reg.exe 2888 reg.exe 4876 reg.exe 2312 reg.exe 32 reg.exe 3460 reg.exe 4672 reg.exe 2816 reg.exe 4920 reg.exe 3196 reg.exe 792 reg.exe 4468 reg.exe 2920 reg.exe 1336 Process not Found 4272 reg.exe 224 reg.exe 4564 reg.exe 1544 reg.exe 4132 reg.exe 4532 reg.exe 2348 reg.exe 3448 reg.exe 800 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 4260 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 4260 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 4260 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 4260 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2216 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2216 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2216 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2216 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 4776 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 4776 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 4776 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 4776 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 3492 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 3492 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 3492 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 3492 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2616 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2616 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2616 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2616 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 3828 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 3828 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 3828 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 3828 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 4616 cmd.exe 4616 cmd.exe 4616 cmd.exe 4616 cmd.exe 4384 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 4384 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 4384 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 4384 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 2352 Conhost.exe 2352 Conhost.exe 2352 Conhost.exe 2352 Conhost.exe 4236 cmd.exe 4236 cmd.exe 4236 cmd.exe 4236 cmd.exe 1364 Conhost.exe 1364 Conhost.exe 1364 Conhost.exe 1364 Conhost.exe 1092 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 1092 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 1092 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 1092 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 1432 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 1432 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 1432 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 1432 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1392 wwMccQIk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe 1392 wwMccQIk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 852 wrote to memory of 4540 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 80 PID 852 wrote to memory of 4540 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 80 PID 852 wrote to memory of 4540 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 80 PID 852 wrote to memory of 1392 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 81 PID 852 wrote to memory of 1392 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 81 PID 852 wrote to memory of 1392 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 81 PID 852 wrote to memory of 4156 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 84 PID 852 wrote to memory of 4156 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 84 PID 852 wrote to memory of 4156 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 84 PID 4156 wrote to memory of 3656 4156 cmd.exe 93 PID 4156 wrote to memory of 3656 4156 cmd.exe 93 PID 4156 wrote to memory of 3656 4156 cmd.exe 93 PID 852 wrote to memory of 2616 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 90 PID 852 wrote to memory of 2616 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 90 PID 852 wrote to memory of 2616 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 90 PID 852 wrote to memory of 3964 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 89 PID 852 wrote to memory of 3964 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 89 PID 852 wrote to memory of 3964 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 89 PID 852 wrote to memory of 1828 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 87 PID 852 wrote to memory of 1828 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 87 PID 852 wrote to memory of 1828 852 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 87 PID 3656 wrote to memory of 2072 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 92 PID 3656 wrote to memory of 2072 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 92 PID 3656 wrote to memory of 2072 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 92 PID 2072 wrote to memory of 2284 2072 cmd.exe 94 PID 2072 wrote to memory of 2284 2072 cmd.exe 94 PID 2072 wrote to memory of 2284 2072 cmd.exe 94 PID 2284 wrote to memory of 4876 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 95 PID 2284 wrote to memory of 4876 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 95 PID 2284 wrote to memory of 4876 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 95 PID 4876 wrote to memory of 4260 4876 cmd.exe 97 PID 4876 wrote to memory of 4260 4876 cmd.exe 97 PID 4876 wrote to memory of 4260 4876 cmd.exe 97 PID 3656 wrote to memory of 3828 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 99 PID 3656 wrote to memory of 3828 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 99 PID 3656 wrote to memory of 3828 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 99 PID 3656 wrote to memory of 2832 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 125 PID 3656 wrote to memory of 2832 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 125 PID 3656 wrote to memory of 2832 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 125 PID 2284 wrote to memory of 1544 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 98 PID 2284 wrote to memory of 1544 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 98 PID 2284 wrote to memory of 1544 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 98 PID 2284 wrote to memory of 3444 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 124 PID 2284 wrote to memory of 3444 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 124 PID 2284 wrote to memory of 3444 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 124 PID 3656 wrote to memory of 3520 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 123 PID 3656 wrote to memory of 3520 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 123 PID 3656 wrote to memory of 3520 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 123 PID 3656 wrote to memory of 3912 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 102 PID 3656 wrote to memory of 3912 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 102 PID 3656 wrote to memory of 3912 3656 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 102 PID 2284 wrote to memory of 1624 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 101 PID 2284 wrote to memory of 1624 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 101 PID 2284 wrote to memory of 1624 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 101 PID 2284 wrote to memory of 4552 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 107 PID 2284 wrote to memory of 4552 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 107 PID 2284 wrote to memory of 4552 2284 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 107 PID 4260 wrote to memory of 60 4260 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 109 PID 4260 wrote to memory of 60 4260 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 109 PID 4260 wrote to memory of 60 4260 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 109 PID 4260 wrote to memory of 3952 4260 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 110 PID 4260 wrote to memory of 3952 4260 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 110 PID 4260 wrote to memory of 3952 4260 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 110 PID 4260 wrote to memory of 792 4260 5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe 111 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe"C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\RYQcIogw\JiUkUAwQ.exe"C:\Users\Admin\RYQcIogw\JiUkUAwQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4540
-
-
C:\ProgramData\DYgkMMoM\wwMccQIk.exe"C:\ProgramData\DYgkMMoM\wwMccQIk.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"2⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412863⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵PID:3828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VcAkYsEg.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""4⤵PID:3912
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:5004
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵PID:3520
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:2832
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:1828
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3964
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:2616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\meIUUIgo.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""2⤵PID:4184
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:3104
-
-
-
C:\ProgramData\XWgYYYUk\QkgEQIcI.exeC:\ProgramData\XWgYYYUk\QkgEQIcI.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412862⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"3⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412864⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"5⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412866⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"7⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412868⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"9⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128610⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"11⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128612⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"13⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128614⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"15⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128616⤵PID:4616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"17⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128618⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"19⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128620⤵PID:2352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"21⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128622⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"23⤵PID:3084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cOsEEEQw.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""23⤵PID:3448
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs24⤵PID:4388
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f23⤵
- UAC bypass
PID:5068
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 223⤵PID:4076
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 123⤵
- Modifies registry key
PID:3108
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:2244
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV123⤵PID:1216
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WmUQsUMM.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""21⤵PID:5108
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs22⤵PID:1220
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f21⤵PID:4872
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 221⤵PID:4356
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 121⤵PID:3972
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 219⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128620⤵PID:1192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"21⤵
- Checks whether UAC is enabled
- System policy modification
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128622⤵PID:1816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"23⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128624⤵PID:2284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vCMAEMQI.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""25⤵PID:4116
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f25⤵PID:2560
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 225⤵
- Modifies registry key
PID:2140
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 125⤵
- Modifies visibility of file extensions in Explorer
PID:676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"25⤵PID:3868
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵
- Checks whether UAC is enabled
- System policy modification
PID:4544
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iKcwkQQw.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""23⤵PID:4952
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f23⤵PID:3696
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 223⤵PID:4008
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 123⤵PID:3540
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV122⤵PID:2632
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 121⤵PID:2820
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 221⤵PID:2824
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 119⤵PID:4132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZUUMMgsQ.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""19⤵PID:1404
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs20⤵PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128620⤵PID:4380
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f19⤵
- UAC bypass
PID:368
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 117⤵PID:2272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kecAsgco.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""17⤵PID:3880
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs18⤵PID:4836
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f17⤵PID:2408
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 217⤵PID:2484
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 115⤵
- Modifies registry key
PID:4220
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f15⤵PID:4008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pgAgoUsY.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""15⤵PID:3872
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs16⤵PID:5112
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 215⤵
- Modifies registry key
PID:3460
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 113⤵
- Modifies visibility of file extensions in Explorer
PID:5068
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 213⤵
- Modifies registry key
PID:4564
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f13⤵
- UAC bypass
PID:4460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ukMAckQY.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""13⤵PID:3196
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs14⤵PID:1212
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 111⤵
- Modifies registry key
PID:32
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 211⤵
- Modifies registry key
PID:524
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f11⤵
- UAC bypass
PID:3632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YEQkIoEs.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""11⤵PID:2580
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs12⤵PID:1668
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HYYMowcw.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""9⤵PID:2240
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs10⤵PID:3160
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f9⤵
- UAC bypass
- Modifies registry key
PID:3136
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 29⤵PID:4840
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 19⤵PID:2280
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:3888
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 17⤵PID:4744
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f7⤵PID:2756
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 27⤵PID:4384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JIQEEoYw.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""7⤵PID:804
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs8⤵PID:3904
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵
- Modifies visibility of file extensions in Explorer
PID:3952
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵PID:792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MQUwMUoM.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""5⤵PID:3960
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs6⤵PID:1268
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵PID:4708
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1544
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
PID:1624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BegUAcUM.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""3⤵PID:4552
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:3412
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:3444
-
-
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412861⤵PID:1364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"2⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412863⤵PID:1092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"4⤵PID:3172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xqwUEcss.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""4⤵PID:4404
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:3168
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
PID:620
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:1288
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:2428
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cAcIoYMs.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""2⤵PID:4400
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:792
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:2608
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:2696
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412861⤵PID:1432
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:2536
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KaUQMYws.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""2⤵PID:1604
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:2256
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:3044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"2⤵PID:2308
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3528
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2608
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3612
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412861⤵PID:4708
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:4816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xCEQMsAE.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""2⤵PID:2820
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:3808
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3456
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:3420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"2⤵PID:1192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aQMQcooU.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""3⤵PID:4764
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
PID:3716
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Modifies visibility of file extensions in Explorer
PID:2272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"1⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412862⤵PID:3712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DOQEYUQo.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
PID:4772
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:3764
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies registry key
PID:1544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"3⤵PID:4496
-
-
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412861⤵PID:4364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TSwgoMIE.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""2⤵PID:2284
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:2632
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4356
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:2520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"2⤵PID:3996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gowwIAUI.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""1⤵PID:4776
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:4912
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:1092
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:4112
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412861⤵PID:4712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gQIIAoAw.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""2⤵PID:2124
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:1788
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3764
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"2⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412861⤵PID:4368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gIskgcoQ.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""2⤵PID:4924
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:1476
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4148
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:3424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"2⤵PID:4292
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1152
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"1⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412862⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"3⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412864⤵PID:4904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VEkIgEsY.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""5⤵PID:3812
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs6⤵PID:2348
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵
- Modifies registry key
PID:2888
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵PID:3872
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵PID:424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"5⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412866⤵PID:2120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AqYAwUEQ.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""7⤵PID:3868
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs8⤵PID:2156
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f7⤵
- UAC bypass
- Modifies registry key
PID:4052
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 27⤵
- Modifies registry key
PID:3448
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 17⤵PID:1592
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"7⤵PID:1404
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gIIkcIIM.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""3⤵PID:428
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:4360
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:4544
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:2752
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2824
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵
- Modifies visibility of file extensions in Explorer
PID:3416
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:1544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xCwUEgUY.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""1⤵PID:2056
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:1656
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- Modifies registry key
PID:2580
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:1828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412861⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412861⤵PID:2008
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:2996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DOIcYMEQ.bat" "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exe""2⤵PID:2416
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:3784
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4968
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:4704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412863⤵PID:1240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"4⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412865⤵PID:3380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"6⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412867⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"8⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a96412869⤵PID:3880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"10⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128611⤵PID:4268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"12⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128613⤵PID:4504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"14⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128615⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"16⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128617⤵PID:4536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"18⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128619⤵PID:4404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"20⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128621⤵PID:1844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"22⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128623⤵PID:2572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"24⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128625⤵PID:2312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"26⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128627⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"28⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128629⤵PID:3168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"30⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128631⤵PID:900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"32⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128633⤵PID:4432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"34⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128635⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"36⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128637⤵PID:1972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"38⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128639⤵PID:3952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"40⤵PID:176
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128641⤵PID:4732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"42⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128643⤵PID:3160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"44⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128645⤵PID:1432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"46⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128647⤵PID:2256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"48⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128649⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"50⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128651⤵PID:5116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"52⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128653⤵PID:4624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"54⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128655⤵PID:4908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"56⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128657⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"58⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128659⤵PID:632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"60⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128661⤵PID:4016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"62⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128663⤵PID:2220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"64⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128665⤵PID:1164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"66⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128667⤵PID:4832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"68⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128669⤵PID:4940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"70⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128671⤵PID:1152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"72⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128673⤵PID:1860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"74⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128675⤵PID:1668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"76⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128677⤵PID:424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"78⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128679⤵PID:3484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"80⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128681⤵PID:1944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"82⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128683⤵PID:4504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"84⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128685⤵PID:4384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"86⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128687⤵PID:3636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"88⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128689⤵PID:1616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"90⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128691⤵PID:1180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"92⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128693⤵PID:2272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"94⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128695⤵PID:5032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"96⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128697⤵PID:1856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"98⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a964128699⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"100⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286101⤵PID:4108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"102⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286103⤵PID:3444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"104⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286105⤵PID:3212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"106⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286107⤵PID:448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"108⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286109⤵PID:4156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"110⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286111⤵PID:4772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"112⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286113⤵PID:4024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"114⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286115⤵PID:4224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"116⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286117⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"118⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286119⤵PID:428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"120⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286.exeC:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286121⤵PID:368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5e94a4d2421b5aab383f5a6916ea765c45014c8b5357a41f9b34ec61a9641286"122⤵PID:1056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-