Analysis
-
max time kernel
188s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe
Resource
win10v2004-20220812-en
General
-
Target
862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe
-
Size
493KB
-
MD5
91bd1e636e9b22b27ee5ff26c0013b90
-
SHA1
780e4aaf6645b9acb08db9a31297531e27166941
-
SHA256
862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31
-
SHA512
3a2fbcefe28e103141f1bda319d9ffc9d44d249b0a5755c292e282f8047fff8678964d291733eaeab630fab30e0daa54ebcc3bf7b63b17434a5d93db53032feb
-
SSDEEP
12288:Ij/tO6OU85qlIFAktw4Pi0YYIJgXa6ESJy8AR5SJ:qHOJqWmkpPi0YYIJiPN6A
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\VUsIwgMY\\nqgocoEI.exe," 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\VUsIwgMY\\nqgocoEI.exe," 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3952 3160 cmd.exe 166 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 3160 reg.exe 166 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4772 3160 reg.exe 166 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1716 3160 reg.exe 166 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4832 tEAsEcUU.exe 3456 nqgocoEI.exe 4496 kekUEIUk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nqgocoEI.exe = "C:\\ProgramData\\VUsIwgMY\\nqgocoEI.exe" kekUEIUk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tEAsEcUU.exe = "C:\\Users\\Admin\\YIAQIIMY\\tEAsEcUU.exe" 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nqgocoEI.exe = "C:\\ProgramData\\VUsIwgMY\\nqgocoEI.exe" 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tEAsEcUU.exe = "C:\\Users\\Admin\\YIAQIIMY\\tEAsEcUU.exe" tEAsEcUU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nqgocoEI.exe = "C:\\ProgramData\\VUsIwgMY\\nqgocoEI.exe" nqgocoEI.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\YIAQIIMY kekUEIUk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\YIAQIIMY\tEAsEcUU kekUEIUk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4704 reg.exe 220 reg.exe 4904 Process not Found 4120 reg.exe 3500 reg.exe 3184 reg.exe 1708 reg.exe 2576 reg.exe 2080 reg.exe 1564 reg.exe 1968 reg.exe 1916 reg.exe 4056 reg.exe 2812 reg.exe 3636 reg.exe 5096 reg.exe 3044 reg.exe 3604 reg.exe 3016 reg.exe 3660 reg.exe 3080 reg.exe 5012 Process not Found 4028 reg.exe 2080 reg.exe 4236 reg.exe 1796 reg.exe 4700 reg.exe 224 reg.exe 3628 reg.exe 3960 reg.exe 4700 reg.exe 3400 reg.exe 2132 reg.exe 2392 reg.exe 4708 reg.exe 4272 Process not Found 3532 reg.exe 1180 reg.exe 1336 reg.exe 4672 Process not Found 1716 reg.exe 1384 reg.exe 3952 reg.exe 1364 reg.exe 2292 reg.exe 1724 reg.exe 2608 reg.exe 2560 reg.exe 1388 reg.exe 3524 reg.exe 2228 reg.exe 1768 reg.exe 668 reg.exe 4984 Process not Found 4676 reg.exe 2148 reg.exe 3604 reg.exe 3508 reg.exe 3180 reg.exe 3960 reg.exe 4804 Process not Found 1768 reg.exe 3148 reg.exe 2060 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4224 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4224 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4224 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4224 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3260 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3260 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3260 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3260 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2408 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2408 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2408 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2408 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3160 wmiprvse.exe 3160 wmiprvse.exe 3160 wmiprvse.exe 3160 wmiprvse.exe 744 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 744 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 744 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 744 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2700 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2700 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2700 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2700 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4980 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4980 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4980 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4980 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2392 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2392 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2392 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 2392 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3984 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3984 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3984 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3984 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3716 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3716 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3716 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 3716 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4732 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4732 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4732 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 4732 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 228 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 228 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 228 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 228 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4832 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 79 PID 4868 wrote to memory of 4832 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 79 PID 4868 wrote to memory of 4832 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 79 PID 4868 wrote to memory of 3456 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 80 PID 4868 wrote to memory of 3456 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 80 PID 4868 wrote to memory of 3456 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 80 PID 4868 wrote to memory of 3564 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 82 PID 4868 wrote to memory of 3564 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 82 PID 4868 wrote to memory of 3564 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 82 PID 4868 wrote to memory of 996 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 89 PID 4868 wrote to memory of 996 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 89 PID 4868 wrote to memory of 996 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 89 PID 4868 wrote to memory of 1028 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 88 PID 4868 wrote to memory of 1028 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 88 PID 4868 wrote to memory of 1028 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 88 PID 4868 wrote to memory of 3124 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 86 PID 4868 wrote to memory of 3124 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 86 PID 4868 wrote to memory of 3124 4868 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 86 PID 3564 wrote to memory of 4692 3564 cmd.exe 85 PID 3564 wrote to memory of 4692 3564 cmd.exe 85 PID 3564 wrote to memory of 4692 3564 cmd.exe 85 PID 4692 wrote to memory of 316 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 111 PID 4692 wrote to memory of 316 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 111 PID 4692 wrote to memory of 316 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 111 PID 316 wrote to memory of 2824 316 cmd.exe 109 PID 316 wrote to memory of 2824 316 cmd.exe 109 PID 316 wrote to memory of 2824 316 cmd.exe 109 PID 4692 wrote to memory of 1284 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 91 PID 4692 wrote to memory of 1284 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 91 PID 4692 wrote to memory of 1284 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 91 PID 4692 wrote to memory of 1180 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 108 PID 4692 wrote to memory of 1180 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 108 PID 4692 wrote to memory of 1180 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 108 PID 4692 wrote to memory of 4120 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 106 PID 4692 wrote to memory of 4120 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 106 PID 4692 wrote to memory of 4120 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 106 PID 4692 wrote to memory of 4660 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 104 PID 4692 wrote to memory of 4660 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 104 PID 4692 wrote to memory of 4660 4692 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 104 PID 2824 wrote to memory of 2252 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 102 PID 2824 wrote to memory of 2252 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 102 PID 2824 wrote to memory of 2252 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 102 PID 2824 wrote to memory of 3532 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 101 PID 2824 wrote to memory of 3532 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 101 PID 2824 wrote to memory of 3532 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 101 PID 2824 wrote to memory of 4548 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 100 PID 2824 wrote to memory of 4548 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 100 PID 2824 wrote to memory of 4548 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 100 PID 2824 wrote to memory of 1412 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 98 PID 2824 wrote to memory of 1412 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 98 PID 2824 wrote to memory of 1412 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 98 PID 2824 wrote to memory of 4444 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 96 PID 2824 wrote to memory of 4444 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 96 PID 2824 wrote to memory of 4444 2824 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 96 PID 2252 wrote to memory of 4224 2252 Process not Found 112 PID 2252 wrote to memory of 4224 2252 Process not Found 112 PID 2252 wrote to memory of 4224 2252 Process not Found 112 PID 4224 wrote to memory of 392 4224 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 117 PID 4224 wrote to memory of 392 4224 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 117 PID 4224 wrote to memory of 392 4224 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 117 PID 4224 wrote to memory of 4208 4224 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 222 PID 4224 wrote to memory of 4208 4224 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 222 PID 4224 wrote to memory of 4208 4224 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 222 PID 4224 wrote to memory of 768 4224 862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe"C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\YIAQIIMY\tEAsEcUU.exe"C:\Users\Admin\YIAQIIMY\tEAsEcUU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4832
-
-
C:\ProgramData\VUsIwgMY\nqgocoEI.exe"C:\ProgramData\VUsIwgMY\nqgocoEI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"2⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc313⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:1284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BWAYoIAc.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""4⤵PID:4660
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:1104
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:4120 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4004
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:1180
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"4⤵
- Suspicious use of WriteProcessMemory
PID:316
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:3124
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1028
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xsgQIAss.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""2⤵PID:1168
-
-
C:\ProgramData\iccwQYUU\kekUEIUk.exeC:\ProgramData\iccwQYUU\kekUEIUk.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VEkooQcA.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""1⤵PID:4444
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:992
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:1412
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:4548
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies registry key
PID:3532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"1⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc312⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BIIQEIsk.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""3⤵PID:1240
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:3476
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:4552
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:768
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:4208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"4⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc315⤵PID:2396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zMkAoMIk.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""6⤵PID:4640
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:4172
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
PID:4672
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:4856
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵PID:1044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"6⤵PID:4776
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
PID:1336
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:1368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WyIcYIwE.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""4⤵PID:3984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fKwUkoIs.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""5⤵PID:4148
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs6⤵PID:1040
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵
- UAC bypass
PID:1604
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵PID:668
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵
- Modifies visibility of file extensions in Explorer
PID:3060
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"3⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc314⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵PID:4032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZMEQkAMo.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""5⤵PID:1544
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs6⤵PID:3664
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵
- UAC bypass
PID:4432
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵
- Modifies visibility of file extensions in Explorer
PID:452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"5⤵PID:2656
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc311⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc311⤵PID:3160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"2⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc313⤵
- Suspicious behavior: EnumeratesProcesses
PID:744 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dEIQIogE.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""4⤵PID:3052
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:3464
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵PID:3040
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵PID:4516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"4⤵PID:1620
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:4748
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"1⤵PID:2364
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:2460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PcgEEssM.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""1⤵PID:4408
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:2548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MwMscUYg.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""1⤵PID:3504
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc311⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"2⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc313⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:1600
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fUEgwIUg.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""2⤵PID:3172
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:928
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:5012
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:4012
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:2112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DiwsEwMI.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""1⤵PID:3548
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc313⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zmMYwEAc.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""4⤵PID:1280
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:5028
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵PID:5000
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:3620
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:4120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"4⤵PID:4208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc312⤵PID:364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"1⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc312⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zMUMUkos.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""3⤵PID:3656
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:3440
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵PID:4816
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:2188
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:2056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"3⤵PID:4556
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3636
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jKoEwAgk.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""2⤵
- Process spawned unexpected child process
PID:3952
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Process spawned unexpected child process
- UAC bypass
PID:1044
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Process spawned unexpected child process
PID:4772
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Process spawned unexpected child process
- Modifies registry key
PID:1716
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc311⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"2⤵PID:3788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aUgkQssE.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""2⤵PID:2804
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:3716
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:3524
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4700
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc311⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"2⤵PID:1476
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:2512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wmgsQQkg.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""2⤵PID:388
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:4836
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:3500
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc311⤵
- Suspicious behavior: EnumeratesProcesses
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"2⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc313⤵
- Modifies visibility of file extensions in Explorer
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc314⤵PID:5004
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lucsMMgs.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""2⤵PID:2872
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:2700
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:4752
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4828
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc311⤵PID:2364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"2⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc313⤵PID:4700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"4⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc315⤵PID:3320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"6⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc317⤵PID:4264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"8⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc319⤵PID:3516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"10⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3111⤵PID:3400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"12⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3113⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"14⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3115⤵PID:1364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"16⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3117⤵PID:4840
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵PID:5016
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵PID:3296
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵PID:3168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ygwcsQoc.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""16⤵PID:4004
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:3256
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵PID:804
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵PID:2232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KCcksUMo.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""14⤵PID:3668
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:436
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
- Modifies registry key
PID:1388
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XegEgoYw.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""12⤵PID:1384
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:1068
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
PID:2860
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:2708
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵PID:1504
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
PID:4652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dUQYYEUI.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""10⤵PID:1552
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:3828
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵PID:3628
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:1928
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
PID:4912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"9⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3110⤵PID:4276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"11⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3112⤵PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LCEAEksc.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""11⤵PID:4736
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f11⤵PID:3348
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 211⤵PID:4272
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 111⤵
- Modifies visibility of file extensions in Explorer
PID:2008
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jawMsEsY.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""9⤵PID:512
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f9⤵PID:3352
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 29⤵PID:4536
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 19⤵
- Modifies registry key
PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sQUcoEog.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""8⤵PID:4436
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:3324
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵PID:3044
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:4532
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
PID:1124
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:2196
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
PID:1560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hYIYAcQQ.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""6⤵PID:3692
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:2624
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵PID:1832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tMAEIYgI.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""4⤵PID:3940
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:4188
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:3400
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:2132
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:3472
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IUUgcUsw.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""2⤵PID:4948
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:3580
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:4896
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4188
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:1172
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"1⤵PID:2132
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:812
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:3828
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies registry key
PID:3660
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc311⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"1⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc311⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵PID:3476
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:4776
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc311⤵PID:1276
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
PID:3184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qusEIwEE.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""2⤵PID:2136
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:3600
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"2⤵PID:1380
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"1⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc312⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"3⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc314⤵PID:2608
-
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4988
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"1⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc312⤵PID:3404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nCcIIwMc.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""3⤵PID:1000
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs4⤵PID:4676
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
PID:4860
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:3244
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:3764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"3⤵PID:3548
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:5016
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"1⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc312⤵PID:2872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gMkkIYIY.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""3⤵PID:884
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Modifies visibility of file extensions in Explorer
PID:804
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4232
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"1⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc312⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"3⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc314⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\loEIsEkI.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""5⤵PID:4988
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f5⤵
- UAC bypass
PID:4436
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 25⤵PID:4140
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 15⤵
- Modifies visibility of file extensions in Explorer
PID:3296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"5⤵PID:2428
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HswkwgAo.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""3⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc314⤵PID:4756
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f3⤵
- UAC bypass
PID:3156
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 23⤵PID:1300
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 13⤵PID:4520
-
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:1872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hUoUUMkY.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""1⤵PID:4156
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:3184
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:3368
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵PID:2624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3168
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4008
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4984
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4748
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ecgIYMoA.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""1⤵PID:3668
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:2148
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f1⤵
- UAC bypass
PID:3180
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:2128
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 11⤵
- Modifies visibility of file extensions in Explorer
PID:2872 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:4708
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4508
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:3660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"2⤵PID:3740
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:884
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:3684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"1⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc312⤵PID:812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"3⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc314⤵PID:992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"5⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc316⤵PID:224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"7⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc318⤵PID:2272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"9⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3110⤵PID:1948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"11⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3112⤵PID:1620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"13⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3114⤵PID:2360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"15⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3116⤵PID:4884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"17⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3118⤵PID:4308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"19⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3120⤵PID:3692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"21⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3122⤵PID:4028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"23⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3124⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"25⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3126⤵PID:3504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"27⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3128⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"29⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3130⤵PID:1124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"31⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3132⤵PID:4156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"33⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3134⤵PID:1968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"35⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3136⤵PID:800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"37⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3138⤵PID:1456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"39⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3140⤵PID:1324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"41⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3142⤵PID:1604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"43⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3144⤵PID:3892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"45⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3146⤵PID:3636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"47⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3148⤵PID:2064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"49⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3150⤵PID:2696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"51⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3152⤵PID:2396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"53⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3154⤵PID:1928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"55⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3156⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"57⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3158⤵PID:3660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"59⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3160⤵PID:4432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"61⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3162⤵PID:884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"63⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3164⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"65⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3166⤵PID:868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"67⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3168⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"69⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3170⤵PID:4072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"71⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3172⤵PID:1224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aaYUMYQY.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""73⤵PID:4888
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs74⤵PID:3016
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f73⤵
- Modifies visibility of file extensions in Explorer
PID:2360
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 273⤵PID:4676
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 173⤵PID:3792
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TgcssUIg.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""71⤵PID:2584
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs72⤵PID:1156
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f71⤵
- UAC bypass
PID:2600
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 271⤵PID:3544
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 171⤵
- Modifies visibility of file extensions in Explorer
PID:4204
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RMgwEgIA.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""69⤵PID:1216
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs70⤵PID:432
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f69⤵PID:3388
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 269⤵PID:3260
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 169⤵PID:4228
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fAsYoUEs.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""67⤵PID:1724
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs68⤵PID:3004
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f67⤵PID:1876
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 267⤵PID:3348
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 167⤵
- Modifies registry key
PID:3180
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 165⤵PID:3352
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f65⤵PID:744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eIEsMMwc.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""65⤵PID:4856
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs66⤵PID:2460
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 265⤵PID:4124
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eEIYMEgM.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""63⤵PID:4140
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs64⤵PID:1824
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f63⤵PID:1840
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 263⤵PID:3812
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 163⤵
- Modifies registry key
PID:1968
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MGcQoQQA.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""61⤵PID:3020
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs62⤵PID:4552
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f61⤵PID:2692
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 261⤵
- Modifies registry key
PID:4704
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 161⤵PID:4984
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wAUMgwoA.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""59⤵PID:1284
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs60⤵PID:1180
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f59⤵
- UAC bypass
PID:992
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 259⤵
- Modifies registry key
PID:2080
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 159⤵PID:2360
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 157⤵PID:3484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zqMswoks.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""57⤵PID:4444
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs58⤵PID:4172
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f57⤵PID:1984
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 257⤵PID:4120
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DQcQAkQw.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""55⤵PID:4012
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs56⤵PID:432
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f55⤵
- UAC bypass
PID:1564
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 255⤵PID:3520
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 155⤵PID:3828
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ciYMUQcQ.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""53⤵PID:4860
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs54⤵PID:1620
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f53⤵
- UAC bypass
PID:2260
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 253⤵PID:4224
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 153⤵
- Modifies visibility of file extensions in Explorer
PID:3836
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 151⤵PID:2756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ySQEEwIA.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""51⤵PID:4032
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs52⤵PID:4720
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f51⤵
- UAC bypass
PID:3512
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 251⤵PID:1576
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KwIQAsYQ.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""49⤵PID:3624
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs50⤵PID:3628
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f49⤵
- UAC bypass
PID:1968
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 249⤵PID:4436
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 149⤵PID:4140
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GicgEEkc.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""47⤵PID:3968
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs48⤵PID:4592
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f47⤵
- UAC bypass
PID:3184
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 247⤵PID:4520
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 147⤵
- Modifies visibility of file extensions in Explorer
PID:2604
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iykAEoYk.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""45⤵PID:2860
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs46⤵PID:3212
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f45⤵PID:804
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 245⤵PID:4752
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 145⤵PID:3584
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f43⤵
- UAC bypass
- Modifies registry key
PID:4056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BEcoYEoU.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""43⤵PID:3804
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs44⤵PID:5028
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 243⤵PID:3940
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 143⤵PID:412
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oUgUYwQU.bat" "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exe""41⤵PID:2148
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs42⤵PID:432
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f41⤵
- UAC bypass
PID:4204
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 241⤵PID:3828
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 141⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"40⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3141⤵PID:3892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"42⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3143⤵PID:1252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"44⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3145⤵PID:1840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"46⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3147⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"48⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3149⤵PID:4692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"50⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3151⤵PID:3260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"52⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3153⤵PID:1688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"54⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3155⤵PID:3668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"56⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3157⤵PID:3720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"58⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3159⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"60⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3161⤵PID:2732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"62⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3163⤵PID:3692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"64⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3165⤵PID:1324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"66⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3167⤵PID:4828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"68⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3169⤵PID:4868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"70⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3171⤵PID:1504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"72⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3173⤵PID:884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"74⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3175⤵PID:1700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"76⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3177⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"78⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3179⤵PID:2232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"80⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3181⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"82⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3183⤵PID:1376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"84⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3185⤵PID:2672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"86⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3187⤵PID:3740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"88⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3189⤵PID:1824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"90⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3191⤵PID:2292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"92⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3193⤵PID:4720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"94⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3195⤵PID:4224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"96⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3197⤵PID:1576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"98⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc3199⤵PID:2112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"100⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31101⤵PID:1004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"102⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31103⤵PID:4024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"104⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31105⤵PID:3172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"106⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31107⤵PID:1776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"108⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31109⤵PID:4260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"110⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31111⤵PID:4784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"112⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31113⤵PID:1844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"114⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31115⤵PID:2304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"116⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31117⤵PID:3008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"118⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31119⤵PID:2632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"120⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31.exeC:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31121⤵PID:2272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\862dfab82b9468b58c841bcc780c42835fb061d983298eac8f16b973137bdc31"122⤵PID:3020
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-