Analysis
-
max time kernel
173s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 22:21
Static task
static1
Behavioral task
behavioral1
Sample
e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe
Resource
win10v2004-20220812-en
General
-
Target
e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe
-
Size
441KB
-
MD5
a226c77d2b343db7a9392546cf3c48a0
-
SHA1
7e53b73687387cdd19da6eedefca47a96f08ee02
-
SHA256
e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b
-
SHA512
b6f1116d0ee017c62f24103400c666d6b29de387f0c4deb89fa6261a304d72860500571f12908ba80b3376b95abd1ea609cfc5dff71b507b251d0be958e3be88
-
SSDEEP
6144:YXbd9dRDfQlgJKN28ThdR58CdTTfBG7Bf5K3VSGdA0q8ZHb5DBXr2HA+o8mKEq:YXx9qomhWylVpdA0nV1BX4notKEq
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2128 ACsMgMMY.exe 740 qiosUwIA.exe 540 EAUMAwQo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation qiosUwIA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qiosUwIA.exe = "C:\\ProgramData\\DKEMUIIU\\qiosUwIA.exe" e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ACsMgMMY.exe = "C:\\Users\\Admin\\mqwkocQg\\ACsMgMMY.exe" ACsMgMMY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qiosUwIA.exe = "C:\\ProgramData\\DKEMUIIU\\qiosUwIA.exe" qiosUwIA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qiosUwIA.exe = "C:\\ProgramData\\DKEMUIIU\\qiosUwIA.exe" EAUMAwQo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ACsMgMMY.exe = "C:\\Users\\Admin\\mqwkocQg\\ACsMgMMY.exe" e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheFormatReceive.docx qiosUwIA.exe File opened for modification C:\Windows\SysWOW64\sheResetSearch.zip qiosUwIA.exe File opened for modification C:\Windows\SysWOW64\sheSplitJoin.bmp qiosUwIA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\mqwkocQg EAUMAwQo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\mqwkocQg\ACsMgMMY EAUMAwQo.exe File created C:\Windows\SysWOW64\shell32.dll.exe qiosUwIA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 816 reg.exe 3392 reg.exe 4380 reg.exe 340 reg.exe 4780 reg.exe 4136 reg.exe 2032 reg.exe 1272 reg.exe 1540 reg.exe 4644 reg.exe 3476 reg.exe 4084 reg.exe 1764 reg.exe 2408 reg.exe 2344 reg.exe 1720 reg.exe 2176 reg.exe 996 reg.exe 4672 reg.exe 3736 reg.exe 4208 reg.exe 4940 reg.exe 4320 reg.exe 4464 reg.exe 3332 reg.exe 1988 reg.exe 4460 reg.exe 376 reg.exe 2132 reg.exe 2768 reg.exe 2828 reg.exe 3596 reg.exe 1132 reg.exe 3120 reg.exe 4948 reg.exe 5004 reg.exe 1048 reg.exe 2344 reg.exe 2104 reg.exe 4896 reg.exe 3896 reg.exe 1992 reg.exe 4000 reg.exe 4212 reg.exe 3940 reg.exe 4568 reg.exe 4832 reg.exe 4988 reg.exe 4248 reg.exe 5088 reg.exe 5008 reg.exe 2904 reg.exe 2924 reg.exe 5012 reg.exe 4084 reg.exe 2904 reg.exe 4040 reg.exe 4912 reg.exe 4460 reg.exe 5100 reg.exe 1384 reg.exe 4548 reg.exe 3888 reg.exe 4596 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4480 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4480 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4480 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4480 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 708 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 708 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 708 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 708 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 5104 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 5104 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 5104 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 5104 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1116 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1116 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1116 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1116 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 2040 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 2040 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 2040 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 2040 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1220 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1220 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1220 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1220 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1656 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1656 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1656 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1656 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4048 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4048 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4048 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4048 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4212 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4212 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4212 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 4212 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 2888 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 2888 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 2888 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 2888 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1860 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1860 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1860 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1860 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1100 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1100 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1100 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 1100 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 204 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 204 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 204 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 204 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 740 qiosUwIA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe 740 qiosUwIA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3452 wrote to memory of 2128 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 79 PID 3452 wrote to memory of 2128 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 79 PID 3452 wrote to memory of 2128 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 79 PID 3452 wrote to memory of 740 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 80 PID 3452 wrote to memory of 740 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 80 PID 3452 wrote to memory of 740 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 80 PID 3452 wrote to memory of 2336 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 82 PID 3452 wrote to memory of 2336 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 82 PID 3452 wrote to memory of 2336 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 82 PID 2336 wrote to memory of 4016 2336 cmd.exe 84 PID 2336 wrote to memory of 4016 2336 cmd.exe 84 PID 2336 wrote to memory of 4016 2336 cmd.exe 84 PID 3452 wrote to memory of 5028 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 85 PID 3452 wrote to memory of 5028 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 85 PID 3452 wrote to memory of 5028 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 85 PID 3452 wrote to memory of 5036 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 89 PID 3452 wrote to memory of 5036 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 89 PID 3452 wrote to memory of 5036 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 89 PID 3452 wrote to memory of 4984 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 87 PID 3452 wrote to memory of 4984 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 87 PID 3452 wrote to memory of 4984 3452 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 87 PID 4016 wrote to memory of 1932 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 91 PID 4016 wrote to memory of 1932 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 91 PID 4016 wrote to memory of 1932 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 91 PID 1932 wrote to memory of 1600 1932 cmd.exe 93 PID 1932 wrote to memory of 1600 1932 cmd.exe 93 PID 1932 wrote to memory of 1600 1932 cmd.exe 93 PID 4016 wrote to memory of 1744 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 94 PID 4016 wrote to memory of 1744 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 94 PID 4016 wrote to memory of 1744 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 94 PID 4016 wrote to memory of 1800 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 96 PID 4016 wrote to memory of 1800 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 96 PID 4016 wrote to memory of 1800 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 96 PID 4016 wrote to memory of 2224 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 101 PID 4016 wrote to memory of 2224 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 101 PID 4016 wrote to memory of 2224 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 101 PID 4016 wrote to memory of 3000 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 98 PID 4016 wrote to memory of 3000 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 98 PID 4016 wrote to memory of 3000 4016 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 98 PID 1600 wrote to memory of 4028 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 102 PID 1600 wrote to memory of 4028 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 102 PID 1600 wrote to memory of 4028 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 102 PID 3000 wrote to memory of 3896 3000 cmd.exe 104 PID 3000 wrote to memory of 3896 3000 cmd.exe 104 PID 3000 wrote to memory of 3896 3000 cmd.exe 104 PID 4028 wrote to memory of 4480 4028 cmd.exe 105 PID 4028 wrote to memory of 4480 4028 cmd.exe 105 PID 4028 wrote to memory of 4480 4028 cmd.exe 105 PID 1600 wrote to memory of 4812 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 106 PID 1600 wrote to memory of 4812 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 106 PID 1600 wrote to memory of 4812 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 106 PID 1600 wrote to memory of 4856 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 107 PID 1600 wrote to memory of 4856 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 107 PID 1600 wrote to memory of 4856 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 107 PID 1600 wrote to memory of 3760 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 108 PID 1600 wrote to memory of 3760 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 108 PID 1600 wrote to memory of 3760 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 108 PID 1600 wrote to memory of 3672 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 110 PID 1600 wrote to memory of 3672 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 110 PID 1600 wrote to memory of 3672 1600 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 110 PID 3672 wrote to memory of 3796 3672 cmd.exe 114 PID 3672 wrote to memory of 3796 3672 cmd.exe 114 PID 3672 wrote to memory of 3796 3672 cmd.exe 114 PID 4480 wrote to memory of 1224 4480 e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe 115 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe"C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\mqwkocQg\ACsMgMMY.exe"C:\Users\Admin\mqwkocQg\ACsMgMMY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2128
-
-
C:\ProgramData\DKEMUIIU\qiosUwIA.exe"C:\ProgramData\DKEMUIIU\qiosUwIA.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"4⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"6⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"8⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b9⤵
- Suspicious behavior: EnumeratesProcesses
PID:708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"10⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b11⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"12⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"14⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"16⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"18⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"20⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"22⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"24⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"26⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"28⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"30⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b31⤵
- Suspicious behavior: EnumeratesProcesses
PID:204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"32⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b33⤵PID:2252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"34⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b35⤵PID:4220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"36⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b37⤵PID:2844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"38⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b39⤵PID:8
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"40⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b41⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"42⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b43⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"44⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b45⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"46⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b47⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"48⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b49⤵PID:1368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"50⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b51⤵PID:1472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"52⤵PID:4644
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵
- Modifies registry key
PID:4084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MuoocQII.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""52⤵PID:5088
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵PID:1828
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
- UAC bypass
PID:4984
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵PID:432
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵PID:2948
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵PID:4680
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- UAC bypass
PID:4364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YIAEMwso.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""50⤵PID:4656
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵PID:972
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵PID:4284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vUQgQIUs.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""48⤵PID:3656
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵PID:4228
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵PID:1660
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵PID:2184
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
- Modifies visibility of file extensions in Explorer
PID:3648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EowQIEoE.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""46⤵PID:1912
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵PID:1168
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵PID:4316
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵PID:2016
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hsEsMcow.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""44⤵PID:1932
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵PID:4040
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
- UAC bypass
- Modifies registry key
PID:816
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵PID:3548
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TWsccMcg.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""42⤵PID:2752
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵PID:1028
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- UAC bypass
PID:4808
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵PID:4304
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QuAMcoAY.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""40⤵PID:3456
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵PID:636
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- UAC bypass
- Modifies registry key
PID:4672
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
- Modifies registry key
PID:5004
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies visibility of file extensions in Explorer
PID:3092
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵PID:3860
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵PID:3920
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
- UAC bypass
PID:2828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zuogksQk.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""38⤵PID:3680
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵PID:432
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵PID:3068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qQgYkscA.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""36⤵PID:4860
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:1332
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵PID:2688
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies registry key
PID:4948
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
- UAC bypass
- Modifies registry key
PID:996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VuAUUckk.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""34⤵PID:3924
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:624
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵PID:4660
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies visibility of file extensions in Explorer
PID:1164
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵PID:4804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kcAEUgkY.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""32⤵PID:1660
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:2580
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵PID:1776
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵PID:2436
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XGIEwUcY.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""30⤵PID:4568
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:1384
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- UAC bypass
PID:4372
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵PID:1992
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies visibility of file extensions in Explorer
PID:4980
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wkYQMskg.bat" "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exe""28⤵PID:1036
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:744
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- Modifies registry key
PID:5100
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:216
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies visibility of file extensions in Explorer
PID:5008
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies registry key
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b27⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"28⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b29⤵PID:4304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"30⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b31⤵PID:3440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"32⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b33⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"34⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b35⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"36⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b37⤵PID:824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"38⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b39⤵PID:5004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"40⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b41⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"42⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b43⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"44⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b45⤵PID:340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"46⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b47⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"48⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b49⤵PID:3272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"50⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b51⤵PID:2164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"52⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b53⤵PID:3168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"54⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b55⤵PID:3116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"56⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b57⤵PID:5088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"58⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b59⤵PID:1028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"60⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b61⤵PID:924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"62⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b63⤵PID:1744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"64⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b65⤵PID:1140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"66⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b67⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"68⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b69⤵PID:4680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"70⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b71⤵PID:1332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"72⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b73⤵PID:3204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"74⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b75⤵PID:636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"76⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b77⤵PID:832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"78⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b79⤵PID:4576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"80⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b81⤵PID:4232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"82⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b83⤵PID:752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"84⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b85⤵PID:3688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"86⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b87⤵PID:3100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"88⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b89⤵PID:1604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"90⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b91⤵PID:376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"92⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b93⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"94⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b95⤵PID:4232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"96⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b97⤵PID:1852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"98⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b99⤵PID:3548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"100⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b101⤵PID:728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"102⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b103⤵PID:1564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"104⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b105⤵PID:3736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"106⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b107⤵PID:2580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"108⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b109⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"110⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b111⤵PID:3728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"112⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b113⤵PID:1328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"114⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b115⤵PID:744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"116⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b117⤵PID:2508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"118⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b119⤵PID:4636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"120⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b.exeC:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b121⤵PID:5028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6c26f4c515207c52d123606bc1f820d28aa242c286ccc1e2e7a35e1e0b1498b"122⤵PID:3644
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-