Analysis
-
max time kernel
153s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 22:30
Static task
static1
Behavioral task
behavioral1
Sample
2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe
Resource
win10v2004-20220901-en
General
-
Target
2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe
-
Size
486KB
-
MD5
826ce8e73c528bfd03b63eff6ef751a0
-
SHA1
5cda6499c8bb54442497e0bda1ecd8cfbfbf1831
-
SHA256
2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3
-
SHA512
95248f98c8cc3cd353715ef4ed180c0eb8444926556d697aea81d8cc0da4e5019dadcfe35c0789dbe9accfa026bb91a5040b19ce60adef16b16536a3251cf55e
-
SSDEEP
12288:8CyYw6a6zcNT6FYhQpHMIRfUa6QIvLuX4MguBKm3ZmZw96k6mmguRxi5WczDHh8X:8NjHQhMIuDugWKm3ZmZw96k6mmguHi5P
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\xiUAEsYM\\PugYYEss.exe," 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\xiUAEsYM\\PugYYEss.exe," 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 992 hYsUAQQA.exe 4824 PugYYEss.exe 792 WMUAQIwI.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation hYsUAQQA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hYsUAQQA.exe = "C:\\Users\\Admin\\EeQYMcgw\\hYsUAQQA.exe" hYsUAQQA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PugYYEss.exe = "C:\\ProgramData\\xiUAEsYM\\PugYYEss.exe" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PugYYEss.exe = "C:\\ProgramData\\xiUAEsYM\\PugYYEss.exe" PugYYEss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PugYYEss.exe = "C:\\ProgramData\\xiUAEsYM\\PugYYEss.exe" WMUAQIwI.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hYsUAQQA.exe = "C:\\Users\\Admin\\EeQYMcgw\\hYsUAQQA.exe" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\EeQYMcgw WMUAQIwI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\EeQYMcgw\hYsUAQQA WMUAQIwI.exe File created C:\Windows\SysWOW64\shell32.dll.exe hYsUAQQA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1956 reg.exe 3876 reg.exe 1652 reg.exe 4056 reg.exe 3956 reg.exe 2496 reg.exe 3456 reg.exe 1688 reg.exe 4784 reg.exe 2396 reg.exe 3032 reg.exe 4980 reg.exe 2164 reg.exe 4884 reg.exe 2800 reg.exe 904 reg.exe 3816 reg.exe 2164 reg.exe 1040 reg.exe 1584 reg.exe 3652 reg.exe 2416 reg.exe 1736 reg.exe 1324 reg.exe 3584 reg.exe 896 reg.exe 4040 reg.exe 3572 reg.exe 4408 reg.exe 2128 reg.exe 1316 reg.exe 5044 reg.exe 4360 reg.exe 3692 reg.exe 2056 reg.exe 2424 reg.exe 4336 reg.exe 2416 reg.exe 4980 reg.exe 2236 reg.exe 256 reg.exe 3372 reg.exe 2812 reg.exe 2952 reg.exe 1152 reg.exe 4972 reg.exe 4568 reg.exe 5112 reg.exe 4104 reg.exe 804 reg.exe 4636 reg.exe 1452 reg.exe 628 reg.exe 3156 reg.exe 1936 reg.exe 212 reg.exe 2176 reg.exe 2188 reg.exe 2364 reg.exe 1184 reg.exe 1812 reg.exe 5108 reg.exe 1428 reg.exe 4232 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 1148 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 1148 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 1148 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 1148 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4676 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4676 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4676 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4676 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4288 cscript.exe 4288 cscript.exe 4288 cscript.exe 4288 cscript.exe 4796 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4796 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4796 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4796 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 2312 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 2312 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 2312 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 2312 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 984 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 984 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 984 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 984 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 544 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 544 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 544 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 544 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 3908 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 3908 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 3908 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 3908 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4576 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4576 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4576 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4576 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4416 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4416 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4416 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4416 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4588 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4588 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4588 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4588 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4168 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4168 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4168 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4168 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4636 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4636 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4636 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 4636 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 992 hYsUAQQA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe 992 hYsUAQQA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 992 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 80 PID 2344 wrote to memory of 992 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 80 PID 2344 wrote to memory of 992 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 80 PID 2344 wrote to memory of 4824 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 81 PID 2344 wrote to memory of 4824 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 81 PID 2344 wrote to memory of 4824 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 81 PID 2344 wrote to memory of 1540 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 83 PID 2344 wrote to memory of 1540 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 83 PID 2344 wrote to memory of 1540 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 83 PID 2344 wrote to memory of 1812 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 85 PID 2344 wrote to memory of 1812 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 85 PID 2344 wrote to memory of 1812 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 85 PID 2344 wrote to memory of 3652 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 91 PID 2344 wrote to memory of 3652 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 91 PID 2344 wrote to memory of 3652 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 91 PID 2344 wrote to memory of 4980 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 90 PID 2344 wrote to memory of 4980 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 90 PID 2344 wrote to memory of 4980 2344 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 90 PID 1540 wrote to memory of 1652 1540 cmd.exe 89 PID 1540 wrote to memory of 1652 1540 cmd.exe 89 PID 1540 wrote to memory of 1652 1540 cmd.exe 89 PID 1652 wrote to memory of 4964 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 92 PID 1652 wrote to memory of 4964 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 92 PID 1652 wrote to memory of 4964 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 92 PID 1652 wrote to memory of 4056 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 94 PID 1652 wrote to memory of 4056 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 94 PID 1652 wrote to memory of 4056 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 94 PID 1652 wrote to memory of 4052 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 96 PID 1652 wrote to memory of 4052 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 96 PID 1652 wrote to memory of 4052 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 96 PID 1652 wrote to memory of 3956 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 101 PID 1652 wrote to memory of 3956 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 101 PID 1652 wrote to memory of 3956 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 101 PID 1652 wrote to memory of 832 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 98 PID 1652 wrote to memory of 832 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 98 PID 1652 wrote to memory of 832 1652 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 98 PID 4964 wrote to memory of 4360 4964 cmd.exe 102 PID 4964 wrote to memory of 4360 4964 cmd.exe 102 PID 4964 wrote to memory of 4360 4964 cmd.exe 102 PID 832 wrote to memory of 380 832 cmd.exe 103 PID 832 wrote to memory of 380 832 cmd.exe 103 PID 832 wrote to memory of 380 832 cmd.exe 103 PID 4360 wrote to memory of 2832 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 104 PID 4360 wrote to memory of 2832 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 104 PID 4360 wrote to memory of 2832 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 104 PID 4360 wrote to memory of 1624 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 106 PID 4360 wrote to memory of 1624 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 106 PID 4360 wrote to memory of 1624 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 106 PID 4360 wrote to memory of 4612 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 114 PID 4360 wrote to memory of 4612 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 114 PID 4360 wrote to memory of 4612 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 114 PID 4360 wrote to memory of 2592 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 108 PID 4360 wrote to memory of 2592 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 108 PID 4360 wrote to memory of 2592 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 108 PID 4360 wrote to memory of 4200 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 109 PID 4360 wrote to memory of 4200 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 109 PID 4360 wrote to memory of 4200 4360 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 109 PID 2832 wrote to memory of 1148 2832 cmd.exe 112 PID 2832 wrote to memory of 1148 2832 cmd.exe 112 PID 2832 wrote to memory of 1148 2832 cmd.exe 112 PID 4200 wrote to memory of 916 4200 cmd.exe 115 PID 4200 wrote to memory of 916 4200 cmd.exe 115 PID 4200 wrote to memory of 916 4200 cmd.exe 115 PID 1148 wrote to memory of 4164 1148 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe 116 -
System policy modification 1 TTPs 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe"C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\EeQYMcgw\hYsUAQQA.exe"C:\Users\Admin\EeQYMcgw\hYsUAQQA.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:992
-
-
C:\ProgramData\xiUAEsYM\PugYYEss.exe"C:\ProgramData\xiUAEsYM\PugYYEss.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"2⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff33⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"4⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff35⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"6⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff37⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"8⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff39⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"10⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff311⤵PID:4288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"12⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff313⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"14⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff315⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"16⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff317⤵
- Suspicious behavior: EnumeratesProcesses
PID:984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"18⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff319⤵
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"20⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff321⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"22⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff323⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"24⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff325⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"26⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff327⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"28⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff329⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"30⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff331⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"32⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff333⤵PID:5028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"34⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff335⤵
- Modifies visibility of file extensions in Explorer
PID:3360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"36⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff337⤵PID:1156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"38⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff339⤵PID:1316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"40⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff341⤵PID:2144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"42⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff343⤵PID:904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"44⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff345⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"46⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff347⤵PID:4732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"48⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff349⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"50⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff351⤵PID:4180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"52⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff353⤵PID:4600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"54⤵PID:4852
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵
- Modifies visibility of file extensions in Explorer
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff355⤵PID:1040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"56⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff357⤵PID:2468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"58⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff359⤵PID:924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"60⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff361⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"62⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff363⤵PID:3852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"64⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff365⤵PID:4292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"66⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff367⤵PID:1356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"68⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff369⤵
- Modifies visibility of file extensions in Explorer
PID:2788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"70⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff371⤵PID:4548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"72⤵PID:5020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff373⤵PID:896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"74⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff375⤵PID:1640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"76⤵PID:3436
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff377⤵PID:4212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"78⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff379⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"80⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff381⤵PID:4640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"82⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff383⤵PID:1900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"84⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff385⤵PID:2308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"86⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff387⤵PID:5028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"88⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff389⤵PID:924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"90⤵PID:4948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff391⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"92⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff393⤵PID:804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"94⤵
- Modifies visibility of file extensions in Explorer
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff395⤵PID:2060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"96⤵PID:3692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff397⤵PID:744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"98⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff399⤵PID:2724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"100⤵PID:4724
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3101⤵PID:2432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"102⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3103⤵
- Modifies visibility of file extensions in Explorer
PID:4772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"104⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3105⤵PID:2948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"106⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3107⤵PID:4036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"108⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3109⤵PID:4296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"110⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3111⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"112⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3113⤵PID:1064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"114⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3115⤵PID:5108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"116⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3117⤵PID:5072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"118⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3119⤵PID:3840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"120⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3.exeC:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3121⤵PID:4436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b11bff0bfb4feff74237832ad6a32c50c48318f49fb3f40ad468d0eb57e9ff3"122⤵PID:3152
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-