Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
190s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 12:04
Static task
static1
Behavioral task
behavioral1
Sample
6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe
Resource
win10v2004-20220812-en
General
-
Target
6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe
-
Size
447KB
-
MD5
73f9af26ca6b395200133e11a0699b30
-
SHA1
2b14b8174a604d464e1d04d09a76186533b1a6d4
-
SHA256
6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b
-
SHA512
a512f62e37adf304878b8597ba105ed26d4d68b80e4d18217e864d18939a19b1d0638f95d17a6074a7ac275424cdfaa2fc324e11b9faf55054e32b04b44cc7d1
-
SSDEEP
6144:HVcOg2m1np42Xvc7M9IqBJnOqZCQmRpzc9BX6Tk0MzYRKK/O0LqgrQepCYtWYWR:1cOg2Ga2fymDt4Drof6TkVfgrppC8T+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2632 GiAcEwEQ.exe 4704 kUIAgQAk.exe 3560 ACwkAwwU.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kUIAgQAk.exe = "C:\\ProgramData\\LEIYwQUU\\kUIAgQAk.exe" 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kUIAgQAk.exe = "C:\\ProgramData\\LEIYwQUU\\kUIAgQAk.exe" kUIAgQAk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kUIAgQAk.exe = "C:\\ProgramData\\LEIYwQUU\\kUIAgQAk.exe" ACwkAwwU.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GiAcEwEQ.exe = "C:\\Users\\Admin\\rCIAgIgM\\GiAcEwEQ.exe" 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GiAcEwEQ.exe = "C:\\Users\\Admin\\rCIAgIgM\\GiAcEwEQ.exe" GiAcEwEQ.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\rCIAgIgM ACwkAwwU.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\rCIAgIgM\GiAcEwEQ ACwkAwwU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2504 reg.exe 4780 reg.exe 964 reg.exe 4104 reg.exe 436 Process not Found 1140 Process not Found 400 reg.exe 3532 reg.exe 5048 reg.exe 2940 reg.exe 4820 reg.exe 3012 reg.exe 3576 reg.exe 1364 reg.exe 4744 reg.exe 4316 reg.exe 3684 reg.exe 4496 reg.exe 3420 Process not Found 396 reg.exe 1476 Process not Found 4744 reg.exe 2524 reg.exe 208 reg.exe 4572 reg.exe 5008 reg.exe 3508 reg.exe 4032 reg.exe 3380 reg.exe 3920 reg.exe 2760 reg.exe 1004 reg.exe 1200 reg.exe 5012 Process not Found 4120 reg.exe 5096 reg.exe 3652 reg.exe 4228 reg.exe 3908 reg.exe 4324 reg.exe 3672 reg.exe 1896 Process not Found 3652 Process not Found 400 Process not Found 5000 reg.exe 4120 reg.exe 5116 reg.exe 1380 reg.exe 808 Process not Found 608 reg.exe 3988 reg.exe 2352 Process not Found 4296 reg.exe 2356 Process not Found 2312 Process not Found 3116 reg.exe 3488 reg.exe 4668 reg.exe 4920 reg.exe 4444 reg.exe 4272 reg.exe 4476 reg.exe 4032 reg.exe 2428 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4324 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4324 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4324 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4324 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4068 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4068 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4068 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4068 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4940 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4940 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4940 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4940 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 2688 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 2688 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 2688 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 2688 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 1756 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 1756 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 1756 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 1756 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4984 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4984 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4984 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4984 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4180 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4180 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4180 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4180 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 1660 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 1660 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 1660 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 1660 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 5088 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 5088 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 5088 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 5088 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 888 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 888 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 888 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 888 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 3180 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 3180 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 3180 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 3180 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 1184 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 1184 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 1184 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 1184 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4048 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4048 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4048 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 4048 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4156 wrote to memory of 2632 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 84 PID 4156 wrote to memory of 2632 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 84 PID 4156 wrote to memory of 2632 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 84 PID 4156 wrote to memory of 4704 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 85 PID 4156 wrote to memory of 4704 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 85 PID 4156 wrote to memory of 4704 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 85 PID 4156 wrote to memory of 3392 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 128 PID 4156 wrote to memory of 3392 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 128 PID 4156 wrote to memory of 3392 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 128 PID 3392 wrote to memory of 3476 3392 cmd.exe 94 PID 3392 wrote to memory of 3476 3392 cmd.exe 94 PID 3392 wrote to memory of 3476 3392 cmd.exe 94 PID 4156 wrote to memory of 208 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 93 PID 4156 wrote to memory of 208 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 93 PID 4156 wrote to memory of 208 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 93 PID 4156 wrote to memory of 220 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 92 PID 4156 wrote to memory of 220 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 92 PID 4156 wrote to memory of 220 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 92 PID 4156 wrote to memory of 4804 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 90 PID 4156 wrote to memory of 4804 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 90 PID 4156 wrote to memory of 4804 4156 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 90 PID 3476 wrote to memory of 2208 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 96 PID 3476 wrote to memory of 2208 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 96 PID 3476 wrote to memory of 2208 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 96 PID 2208 wrote to memory of 2444 2208 cmd.exe 127 PID 2208 wrote to memory of 2444 2208 cmd.exe 127 PID 2208 wrote to memory of 2444 2208 cmd.exe 127 PID 3476 wrote to memory of 4984 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 97 PID 3476 wrote to memory of 4984 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 97 PID 3476 wrote to memory of 4984 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 97 PID 3476 wrote to memory of 3628 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 126 PID 3476 wrote to memory of 3628 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 126 PID 3476 wrote to memory of 3628 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 126 PID 3476 wrote to memory of 4656 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 98 PID 3476 wrote to memory of 4656 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 98 PID 3476 wrote to memory of 4656 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 98 PID 3476 wrote to memory of 3348 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 101 PID 3476 wrote to memory of 3348 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 101 PID 3476 wrote to memory of 3348 3476 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 101 PID 2444 wrote to memory of 5080 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 104 PID 2444 wrote to memory of 5080 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 104 PID 2444 wrote to memory of 5080 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 104 PID 5080 wrote to memory of 4324 5080 cmd.exe 103 PID 5080 wrote to memory of 4324 5080 cmd.exe 103 PID 5080 wrote to memory of 4324 5080 cmd.exe 103 PID 2444 wrote to memory of 4652 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 123 PID 2444 wrote to memory of 4652 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 123 PID 2444 wrote to memory of 4652 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 123 PID 2444 wrote to memory of 4124 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 113 PID 2444 wrote to memory of 4124 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 113 PID 2444 wrote to memory of 4124 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 113 PID 2444 wrote to memory of 4236 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 109 PID 2444 wrote to memory of 4236 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 109 PID 2444 wrote to memory of 4236 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 109 PID 2444 wrote to memory of 2316 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 105 PID 2444 wrote to memory of 2316 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 105 PID 2444 wrote to memory of 2316 2444 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 105 PID 4324 wrote to memory of 3652 4324 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 111 PID 4324 wrote to memory of 3652 4324 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 111 PID 4324 wrote to memory of 3652 4324 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 111 PID 3652 wrote to memory of 4068 3652 cmd.exe 114 PID 3652 wrote to memory of 4068 3652 cmd.exe 114 PID 3652 wrote to memory of 4068 3652 cmd.exe 114 PID 4324 wrote to memory of 3532 4324 6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe"C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\rCIAgIgM\GiAcEwEQ.exe"C:\Users\Admin\rCIAgIgM\GiAcEwEQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2632
-
-
C:\ProgramData\LEIYwQUU\kUIAgQAk.exe"C:\ProgramData\LEIYwQUU\kUIAgQAk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4704
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:4804
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:220
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"2⤵
- Suspicious use of WriteProcessMemory
PID:3392
-
-
C:\ProgramData\TcAogUkg\ACwkAwwU.exeC:\ProgramData\TcAogUkg\ACwkAwwU.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3560
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"2⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2444
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:4984
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:4656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PgcUQkIE.bat" "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe""2⤵PID:3348
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:1680
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"2⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"4⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b5⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"6⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"8⤵PID:204
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"10⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"12⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"14⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"16⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b17⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"18⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b19⤵
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"20⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"22⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"24⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"26⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b27⤵PID:220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"28⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b29⤵PID:4868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"30⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b31⤵PID:3576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"32⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b33⤵PID:4628
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵PID:3092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mOcEUksg.bat" "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exe""34⤵PID:220
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:4224
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
- UAC bypass
PID:1936
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵PID:4272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"34⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b35⤵PID:2352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"36⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b37⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"38⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b39⤵PID:2220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"40⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b41⤵PID:4324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"42⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b43⤵PID:2644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"44⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b45⤵PID:4844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"46⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b47⤵PID:1512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"48⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b49⤵PID:1808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"50⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b51⤵PID:1632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"52⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b53⤵PID:1068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"54⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b55⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"56⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b57⤵PID:3780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"58⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b59⤵PID:4172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"60⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b61⤵PID:3836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"62⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b63⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"64⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b65⤵PID:3764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"66⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b67⤵PID:3172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"68⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b69⤵PID:8
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"70⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b71⤵PID:2152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"72⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b73⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"74⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b75⤵PID:3204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"76⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b77⤵PID:2952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"78⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b79⤵PID:2320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"80⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b81⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"82⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b83⤵PID:324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"84⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b85⤵PID:3868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"86⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b87⤵PID:3976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"88⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b89⤵PID:3116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"90⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b91⤵PID:5096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"92⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b93⤵PID:4108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"94⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b95⤵PID:4076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"96⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b97⤵PID:888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"98⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b99⤵PID:4792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"100⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b101⤵PID:4688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"102⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b103⤵PID:2420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"104⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b105⤵PID:808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"106⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b107⤵PID:1836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"108⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b109⤵PID:444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"110⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b111⤵PID:2780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"112⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b113⤵PID:3424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"114⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b115⤵PID:2760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"116⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b117⤵PID:3836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"118⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b119⤵PID:3028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"120⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b.exeC:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b121⤵PID:3860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6dd2bb6b8ab1bec7900b8e64cd9dddfaa286ff6f9662513588eb9285f4ae4a4b"122⤵PID:2608
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-