Analysis
-
max time kernel
176s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 22:31
Static task
static1
Behavioral task
behavioral1
Sample
187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe
Resource
win10v2004-20220812-en
General
-
Target
187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe
-
Size
500KB
-
MD5
a0a5b2e9fdf92c51d6672b4f2d946680
-
SHA1
9f951018d47f5708f02febef6bcdac3ef83777ba
-
SHA256
187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b
-
SHA512
05c86b291a0d0150a1270ed05c91bc4589a1bd891ec77ed977b6b5899116ad2f4da0708deaaadda551dbb6d29bd869fd900a81a531807520805953b2cb426f59
-
SSDEEP
12288:E1TNcnMSJBs71d0rSnPeOOdg+gOBZU+EkiHdk:KNcHJBs71ChbsHdk
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\uEAMwEAE\\eCUEQAMo.exe," 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\uEAMwEAE\\eCUEQAMo.exe," 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\uEAMwEAE\\eCUEQAMo.exe,C:\\ProgramData\\SMgIwYko\\gmMgcIIw.exe," 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\uEAMwEAE\\eCUEQAMo.exe,C:\\ProgramData\\SMgIwYko\\gmMgcIIw.exe," 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4544 ZcoEgMsk.exe 1072 eCUEQAMo.exe 3136 GeowAokg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ZcoEgMsk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZcoEgMsk.exe = "C:\\Users\\Admin\\wQUEwYEU\\ZcoEgMsk.exe" 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\eCUEQAMo.exe = "C:\\ProgramData\\uEAMwEAE\\eCUEQAMo.exe" 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZcoEgMsk.exe = "C:\\Users\\Admin\\wQUEwYEU\\ZcoEgMsk.exe" ZcoEgMsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\eCUEQAMo.exe = "C:\\ProgramData\\uEAMwEAE\\eCUEQAMo.exe" eCUEQAMo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\eCUEQAMo.exe = "C:\\ProgramData\\uEAMwEAE\\eCUEQAMo.exe" GeowAokg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GUsQEMco.exe = "C:\\Users\\Admin\\baQcEMMk\\GUsQEMco.exe" 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gmMgcIIw.exe = "C:\\ProgramData\\SMgIwYko\\gmMgcIIw.exe" 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shePingDebug.exe ZcoEgMsk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\wQUEwYEU GeowAokg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\wQUEwYEU\ZcoEgMsk GeowAokg.exe File created C:\Windows\SysWOW64\shell32.dll.exe ZcoEgMsk.exe File opened for modification C:\Windows\SysWOW64\sheDenyDismount.rar ZcoEgMsk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 628 1640 WerFault.exe 1764 1092 540 WerFault.exe 1761 4040 4280 WerFault.exe 1766 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2216 reg.exe 3968 reg.exe 4240 reg.exe 1276 reg.exe 4900 reg.exe 1292 reg.exe 4844 reg.exe 4876 reg.exe 4324 reg.exe 2324 reg.exe 820 reg.exe 1668 reg.exe 3504 reg.exe 2940 reg.exe 4676 reg.exe 4856 reg.exe 4876 reg.exe 4572 reg.exe 1780 reg.exe 4824 reg.exe 1220 reg.exe 4432 reg.exe 4860 reg.exe 4168 reg.exe 5012 reg.exe 1596 reg.exe 4244 reg.exe 2220 reg.exe 2740 reg.exe 2800 reg.exe 2892 reg.exe 4276 reg.exe 1128 reg.exe 2696 reg.exe 5040 reg.exe 2852 reg.exe 3596 reg.exe 4680 reg.exe 828 reg.exe 2088 reg.exe 4080 reg.exe 4368 reg.exe 1332 reg.exe 3776 reg.exe 5084 reg.exe 4688 reg.exe 4432 reg.exe 4160 reg.exe 4660 reg.exe 4668 reg.exe 860 Process not Found 2204 reg.exe 4976 reg.exe 3256 reg.exe 4832 reg.exe 3604 reg.exe 4012 reg.exe 4560 reg.exe 4668 reg.exe 4432 reg.exe 3228 reg.exe 5032 reg.exe 3516 reg.exe 4400 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3908 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3908 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3908 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3908 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3252 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3252 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3252 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3252 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 1440 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 1440 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 1440 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 1440 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3168 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3168 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3168 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3168 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4360 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4360 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4360 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4360 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3944 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3944 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3944 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3944 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3252 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3252 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3252 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3252 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 2840 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 2840 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 2840 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 2840 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4044 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4044 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4044 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4044 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4868 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4868 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4868 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 4868 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3700 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3700 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3700 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3700 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 1768 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 1768 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 1768 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 1768 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3436 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3436 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3436 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 3436 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4544 ZcoEgMsk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe 4544 ZcoEgMsk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4544 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 81 PID 4240 wrote to memory of 4544 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 81 PID 4240 wrote to memory of 4544 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 81 PID 4240 wrote to memory of 1072 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 82 PID 4240 wrote to memory of 1072 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 82 PID 4240 wrote to memory of 1072 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 82 PID 4240 wrote to memory of 1284 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 84 PID 4240 wrote to memory of 1284 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 84 PID 4240 wrote to memory of 1284 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 84 PID 4240 wrote to memory of 2160 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 86 PID 4240 wrote to memory of 2160 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 86 PID 4240 wrote to memory of 2160 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 86 PID 1284 wrote to memory of 4384 1284 cmd.exe 87 PID 1284 wrote to memory of 4384 1284 cmd.exe 87 PID 1284 wrote to memory of 4384 1284 cmd.exe 87 PID 4240 wrote to memory of 1424 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 92 PID 4240 wrote to memory of 1424 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 92 PID 4240 wrote to memory of 1424 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 92 PID 4240 wrote to memory of 4432 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 89 PID 4240 wrote to memory of 4432 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 89 PID 4240 wrote to memory of 4432 4240 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 89 PID 4384 wrote to memory of 436 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 93 PID 4384 wrote to memory of 436 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 93 PID 4384 wrote to memory of 436 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 93 PID 436 wrote to memory of 3528 436 cmd.exe 95 PID 436 wrote to memory of 3528 436 cmd.exe 95 PID 436 wrote to memory of 3528 436 cmd.exe 95 PID 3528 wrote to memory of 3700 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 96 PID 3528 wrote to memory of 3700 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 96 PID 3528 wrote to memory of 3700 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 96 PID 3700 wrote to memory of 3908 3700 cmd.exe 213 PID 3700 wrote to memory of 3908 3700 cmd.exe 213 PID 3700 wrote to memory of 3908 3700 cmd.exe 213 PID 4384 wrote to memory of 2092 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 211 PID 4384 wrote to memory of 2092 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 211 PID 4384 wrote to memory of 2092 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 211 PID 3528 wrote to memory of 1980 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 212 PID 3528 wrote to memory of 1980 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 212 PID 3528 wrote to memory of 1980 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 212 PID 3528 wrote to memory of 4844 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 210 PID 3528 wrote to memory of 4844 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 210 PID 3528 wrote to memory of 4844 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 210 PID 3528 wrote to memory of 3432 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 99 PID 3528 wrote to memory of 3432 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 99 PID 3528 wrote to memory of 3432 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 99 PID 4384 wrote to memory of 5072 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 98 PID 4384 wrote to memory of 5072 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 98 PID 4384 wrote to memory of 5072 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 98 PID 3528 wrote to memory of 2116 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 100 PID 3528 wrote to memory of 2116 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 100 PID 3528 wrote to memory of 2116 3528 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 100 PID 4384 wrote to memory of 3360 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 206 PID 4384 wrote to memory of 3360 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 206 PID 4384 wrote to memory of 3360 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 206 PID 4384 wrote to memory of 4304 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 105 PID 4384 wrote to memory of 4304 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 105 PID 4384 wrote to memory of 4304 4384 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 105 PID 3908 wrote to memory of 3188 3908 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 205 PID 3908 wrote to memory of 3188 3908 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 205 PID 3908 wrote to memory of 3188 3908 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 205 PID 3908 wrote to memory of 2652 3908 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 203 PID 3908 wrote to memory of 2652 3908 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 203 PID 3908 wrote to memory of 2652 3908 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 203 PID 3908 wrote to memory of 1452 3908 187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe 169 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe"C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\wQUEwYEU\ZcoEgMsk.exe"C:\Users\Admin\wQUEwYEU\ZcoEgMsk.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4544
-
-
C:\ProgramData\uEAMwEAE\eCUEQAMo.exe"C:\ProgramData\uEAMwEAE\eCUEQAMo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"2⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"4⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"6⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3908
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
PID:3432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tCgYkcss.bat" "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe""6⤵PID:2116
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:3456
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:4844
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
PID:1980
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:5072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\acMswMcI.bat" "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe""4⤵PID:4304
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:3796
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵PID:3360
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵PID:2092
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:2160
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:4432
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iKMQcIgw.bat" "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe""2⤵PID:4432
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:4576
-
-
-
C:\ProgramData\XWcYQcoI\GeowAokg.exeC:\ProgramData\XWcYQcoI\GeowAokg.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3136
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 21⤵PID:1452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eKcAIgUw.bat" "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe""1⤵PID:3472
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs2⤵PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"2⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵PID:3536
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵PID:1380
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zYgMAAMQ.bat" "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe""4⤵PID:4836
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:1876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"4⤵PID:4688
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iIAUgoAM.bat" "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exe""2⤵PID:4636
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:4444
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:800
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:1868
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"2⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b3⤵PID:3252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"4⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"6⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"8⤵PID:4504
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"10⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"12⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"14⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"16⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b17⤵PID:620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"18⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b19⤵PID:4256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"20⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b21⤵PID:1868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"22⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b23⤵PID:4332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"24⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b25⤵PID:5116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"26⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b27⤵PID:2816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"28⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b29⤵PID:2820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"30⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b31⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"32⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b33⤵PID:1984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"34⤵PID:260
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b35⤵PID:3592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"36⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b37⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"38⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b39⤵PID:920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"40⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b41⤵PID:4148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"42⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b43⤵PID:384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"44⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b45⤵PID:1000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"46⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b47⤵PID:2156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"48⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b49⤵PID:4636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"50⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b51⤵PID:2840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"52⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b53⤵PID:1808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"54⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b55⤵PID:1640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"56⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b57⤵PID:4956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"58⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b59⤵PID:868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"60⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b61⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"62⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b63⤵PID:1012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"64⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b65⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"66⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b67⤵PID:3736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"68⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b69⤵PID:1152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"70⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b71⤵PID:2096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"72⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b73⤵PID:3700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"74⤵PID:3480
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b75⤵PID:4484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"76⤵PID:4704
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:424
-
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b77⤵PID:3448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"78⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b79⤵PID:1260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"80⤵PID:3132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b81⤵PID:2088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"82⤵PID:3908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b83⤵PID:2612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"84⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b85⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"86⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b87⤵PID:3552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"88⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b89⤵PID:3448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"90⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b91⤵PID:1924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"92⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b93⤵PID:3612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"94⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b95⤵PID:2096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"96⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b97⤵PID:1284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"98⤵PID:4784
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b99⤵PID:984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"100⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b101⤵PID:1200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"102⤵
- Checks whether UAC is enabled
- System policy modification
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b103⤵PID:3160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"104⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b105⤵PID:4540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"106⤵PID:4680
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b107⤵PID:4876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"108⤵PID:4848
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:1000
-
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b109⤵PID:1292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"110⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b111⤵PID:1284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"112⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b113⤵PID:3968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"114⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b115⤵PID:3732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"116⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b117⤵PID:1220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"118⤵PID:3624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b119⤵PID:3496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"120⤵PID:4380
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵
- Modifies visibility of file extensions in Explorer
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b.exeC:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b121⤵PID:4276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187917b0f0ff1aaed981b67b692624fc4a90b54cc612fb39eb29b2b935e2fe8b"122⤵PID:1976
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-