Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
165s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe
Resource
win10v2004-20220812-en
General
-
Target
1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe
-
Size
562KB
-
MD5
a29f4477a8ce8bf411be286ceb342400
-
SHA1
bf7b576187219d47f799483c74d6a5d3cac09a3f
-
SHA256
1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300
-
SHA512
779004c93d76706ed391e3b7e7f5d57bc879381aa31dfa66f7a643de6c69d412f326140fb6eb2db9a84ca76829e5fe3107fb9fb0daaa90ae01506badb5adb7b0
-
SSDEEP
12288:LCQeCjVr+8Yo3goxa6HkwlHk2uDN5zNWJS6rsDfjuGfy25d2:giVrbgox5kw5k20NJ6Rgju+5d2
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 992 RGgcMkQY.exe 2024 WeIIwEAg.exe 1560 WAAoQwUk.exe -
Loads dropped DLL 22 IoCs
pid Process 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe 992 RGgcMkQY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WeIIwEAg.exe = "C:\\ProgramData\\rKosQYAo\\WeIIwEAg.exe" WeIIwEAg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WeIIwEAg.exe = "C:\\ProgramData\\rKosQYAo\\WeIIwEAg.exe" WAAoQwUk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\RGgcMkQY.exe = "C:\\Users\\Admin\\QMMMAIMM\\RGgcMkQY.exe" 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WeIIwEAg.exe = "C:\\ProgramData\\rKosQYAo\\WeIIwEAg.exe" 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\RGgcMkQY.exe = "C:\\Users\\Admin\\QMMMAIMM\\RGgcMkQY.exe" RGgcMkQY.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\QMMMAIMM WAAoQwUk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\QMMMAIMM\RGgcMkQY WAAoQwUk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2312 reg.exe 1524 reg.exe 2560 reg.exe 1552 reg.exe 1432 reg.exe 3064 reg.exe 1660 reg.exe 2812 reg.exe 1556 reg.exe 1556 reg.exe 2568 reg.exe 888 reg.exe 660 reg.exe 1592 reg.exe 1696 reg.exe 2112 reg.exe 3664 reg.exe 2512 reg.exe 2912 reg.exe 2572 reg.exe 2548 reg.exe 988 reg.exe 2552 reg.exe 908 reg.exe 600 reg.exe 2880 reg.exe 2352 reg.exe 804 reg.exe 1660 reg.exe 2472 reg.exe 468 reg.exe 1644 reg.exe 848 reg.exe 520 reg.exe 2288 reg.exe 2484 reg.exe 1556 reg.exe 888 reg.exe 2916 reg.exe 624 reg.exe 820 reg.exe 2364 reg.exe 2916 reg.exe 2360 reg.exe 1124 reg.exe 2100 reg.exe 2992 reg.exe 428 reg.exe 1556 reg.exe 1736 reg.exe 1208 reg.exe 2772 reg.exe 1420 reg.exe 1320 reg.exe 792 reg.exe 2764 reg.exe 336 reg.exe 2872 reg.exe 2424 reg.exe 968 reg.exe 968 reg.exe 1980 reg.exe 2276 reg.exe 1284 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1524 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1524 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1752 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1752 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1696 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1696 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2036 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2036 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1208 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1208 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 888 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 888 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 988 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 988 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2020 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2020 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1684 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1684 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2480 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2480 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2660 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2660 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2936 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2936 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1724 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1724 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2236 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2236 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2376 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2376 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2532 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2532 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2748 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2748 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2628 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2628 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2100 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2100 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2224 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2224 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2444 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2444 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 916 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 916 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1268 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1268 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2504 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2504 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2604 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2604 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2452 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2452 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2248 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2248 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1952 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1952 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1208 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1208 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1228 wrote to memory of 992 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 28 PID 1228 wrote to memory of 992 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 28 PID 1228 wrote to memory of 992 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 28 PID 1228 wrote to memory of 992 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 28 PID 1228 wrote to memory of 2024 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 29 PID 1228 wrote to memory of 2024 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 29 PID 1228 wrote to memory of 2024 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 29 PID 1228 wrote to memory of 2024 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 29 PID 1228 wrote to memory of 1064 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 31 PID 1228 wrote to memory of 1064 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 31 PID 1228 wrote to memory of 1064 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 31 PID 1228 wrote to memory of 1064 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 31 PID 1064 wrote to memory of 2012 1064 cmd.exe 33 PID 1064 wrote to memory of 2012 1064 cmd.exe 33 PID 1064 wrote to memory of 2012 1064 cmd.exe 33 PID 1064 wrote to memory of 2012 1064 cmd.exe 33 PID 2012 wrote to memory of 1476 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 35 PID 2012 wrote to memory of 1476 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 35 PID 2012 wrote to memory of 1476 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 35 PID 2012 wrote to memory of 1476 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 35 PID 1228 wrote to memory of 1052 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 34 PID 1228 wrote to memory of 1052 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 34 PID 1228 wrote to memory of 1052 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 34 PID 1228 wrote to memory of 1052 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 34 PID 1228 wrote to memory of 1284 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 36 PID 1228 wrote to memory of 1284 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 36 PID 1228 wrote to memory of 1284 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 36 PID 1228 wrote to memory of 1284 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 36 PID 1228 wrote to memory of 600 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 38 PID 1228 wrote to memory of 600 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 38 PID 1228 wrote to memory of 600 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 38 PID 1228 wrote to memory of 600 1228 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 38 PID 1476 wrote to memory of 820 1476 cmd.exe 42 PID 1476 wrote to memory of 820 1476 cmd.exe 42 PID 1476 wrote to memory of 820 1476 cmd.exe 42 PID 1476 wrote to memory of 820 1476 cmd.exe 42 PID 2012 wrote to memory of 1852 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 43 PID 2012 wrote to memory of 1852 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 43 PID 2012 wrote to memory of 1852 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 43 PID 2012 wrote to memory of 1852 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 43 PID 2012 wrote to memory of 1592 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 45 PID 2012 wrote to memory of 1592 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 45 PID 2012 wrote to memory of 1592 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 45 PID 2012 wrote to memory of 1592 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 45 PID 2012 wrote to memory of 1004 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 47 PID 2012 wrote to memory of 1004 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 47 PID 2012 wrote to memory of 1004 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 47 PID 2012 wrote to memory of 1004 2012 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 47 PID 820 wrote to memory of 1632 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 50 PID 820 wrote to memory of 1632 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 50 PID 820 wrote to memory of 1632 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 50 PID 820 wrote to memory of 1632 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 50 PID 1632 wrote to memory of 1524 1632 cmd.exe 51 PID 1632 wrote to memory of 1524 1632 cmd.exe 51 PID 1632 wrote to memory of 1524 1632 cmd.exe 51 PID 1632 wrote to memory of 1524 1632 cmd.exe 51 PID 820 wrote to memory of 756 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 52 PID 820 wrote to memory of 756 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 52 PID 820 wrote to memory of 756 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 52 PID 820 wrote to memory of 756 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 52 PID 820 wrote to memory of 1644 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 53 PID 820 wrote to memory of 1644 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 53 PID 820 wrote to memory of 1644 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 53 PID 820 wrote to memory of 1644 820 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe"C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\QMMMAIMM\RGgcMkQY.exe"C:\Users\Admin\QMMMAIMM\RGgcMkQY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:992
-
-
C:\ProgramData\rKosQYAo\WeIIwEAg.exe"C:\ProgramData\rKosQYAo\WeIIwEAg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2024
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"2⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13003⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"4⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13005⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"6⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13007⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"8⤵PID:1268
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
PID:1152
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:1052
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
PID:1284
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\gAIgYEsI.bat" "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe""8⤵PID:2132
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:2708
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵PID:756
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:1644
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
PID:1952
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\eiYgYMcg.bat" "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe""6⤵PID:2308
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:2692
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:1852
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:1592
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
PID:1004
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tKogkscg.bat" "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe""4⤵PID:2296
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:2624
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:1052
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:1284
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
PID:600
-
-
C:\ProgramData\yskMIcQE\WAAoQwUk.exeC:\ProgramData\yskMIcQE\WAAoQwUk.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1560
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13001⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"2⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13003⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"4⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13005⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"6⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13007⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"8⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13009⤵
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"10⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130011⤵
- Suspicious behavior: EnumeratesProcesses
PID:988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"12⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130013⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"14⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130015⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"16⤵PID:2288
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies visibility of file extensions in Explorer
PID:2500
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵PID:2508
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- UAC bypass
PID:2524
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\zygsMQUk.bat" "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe""16⤵PID:2960
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:3044
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
PID:1516
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
- Modifies registry key
PID:1124
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- UAC bypass
PID:1420
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kQUsYcQc.bat" "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe""14⤵PID:2120
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:2636
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1552
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:832
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
- Modifies registry key
PID:520
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nWAIwQEE.bat" "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe""12⤵PID:2156
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:2644
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
PID:1548
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:1516
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
PID:1320
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\riAEUksI.bat" "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe""10⤵PID:2144
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:2684
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:848
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:1724
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
PID:1996
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UwcIQQEE.bat" "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe""8⤵PID:2188
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:2700
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
PID:1424
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:624
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
PID:1548
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\bggIwQEE.bat" "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe""6⤵PID:2316
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:2672
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:888
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:2028
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
PID:1724
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PQsMUksI.bat" "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe""4⤵PID:2280
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:2616
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:976
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:1736
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:1580
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\yosQIcQc.bat" "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe""2⤵PID:2272
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:2608
-
-
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13001⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"2⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13003⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"4⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13005⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"6⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13007⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"8⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13009⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"10⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130011⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"12⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130013⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"14⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130015⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"16⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130017⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"18⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130019⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"20⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130021⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"22⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130023⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"24⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130025⤵
- Suspicious behavior: EnumeratesProcesses
PID:916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"26⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130027⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"28⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130029⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"30⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130031⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"32⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130033⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"34⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130035⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"36⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130037⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"38⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130039⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"40⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130041⤵PID:2168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"42⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130043⤵PID:2688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"44⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130045⤵PID:2888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"46⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130047⤵PID:2628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"48⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130049⤵PID:2512
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"50⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130051⤵PID:2940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"52⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130053⤵PID:2420
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"54⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130055⤵PID:1308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"56⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130057⤵PID:2976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"58⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130059⤵PID:1928
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"60⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130061⤵PID:2368
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"62⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130063⤵PID:1580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"64⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130065⤵PID:2184
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"66⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130067⤵PID:2412
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"68⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130069⤵PID:2516
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"70⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130071⤵PID:1524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"72⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130073⤵PID:956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"74⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130075⤵PID:1708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"76⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130077⤵PID:2400
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"78⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130079⤵PID:1540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"80⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130081⤵PID:2820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"82⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130083⤵PID:3004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"84⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130085⤵PID:280
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"86⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130087⤵PID:2120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"88⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130089⤵PID:860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"90⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130091⤵PID:920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"92⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130093⤵PID:3000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"94⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130095⤵PID:2896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"96⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130097⤵PID:1320
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"98⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130099⤵PID:1864
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"100⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300101⤵PID:1168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"102⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300103⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"104⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300105⤵PID:2284
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"106⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300107⤵PID:2404
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"108⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300109⤵PID:1980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"110⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300111⤵PID:2996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"112⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300113⤵PID:3020
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"114⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300115⤵PID:2012
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"116⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300117⤵PID:2944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"118⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300119⤵PID:524
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f120⤵PID:3672
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2120⤵
- Modifies registry key
PID:3664
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1120⤵
- Modifies visibility of file extensions in Explorer
PID:3656
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"120⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300121⤵PID:2336
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"122⤵PID:2596
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-