Analysis
-
max time kernel
157s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 09:20
Static task
static1
Behavioral task
behavioral1
Sample
cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe
Resource
win10v2004-20221111-en
General
-
Target
cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe
-
Size
446KB
-
MD5
15547793bc34de9ae3615c96997e9cd0
-
SHA1
ea8e0dcd4b1424771daafdcc0c064077dac16c7c
-
SHA256
cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68
-
SHA512
4de7677a6585ebd5366c5e34551afccaa0ce772ce20b80d43b2e61933318f64da1d5ed22c56745e6f0461e23081145fba998fa49111bc1e88874eaa78dcbb491
-
SSDEEP
6144:r3+eQg1erKxsoBZWKBPjKg+N9yIq8iBpr+/ZcmMTFjz3ZfOWCoYE+kNDzNBdPZl+:rOeQ8eOxPZvBO/lq4ZxASjeDzNBd7zW
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2412 PKkgQoEs.exe 1224 JCUIYcUk.exe 1644 QgQYUAww.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation PKkgQoEs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PKkgQoEs.exe = "C:\\Users\\Admin\\eUUUwcUI\\PKkgQoEs.exe" cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JCUIYcUk.exe = "C:\\ProgramData\\rUAQcwIQ\\JCUIYcUk.exe" cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PKkgQoEs.exe = "C:\\Users\\Admin\\eUUUwcUI\\PKkgQoEs.exe" PKkgQoEs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JCUIYcUk.exe = "C:\\ProgramData\\rUAQcwIQ\\JCUIYcUk.exe" JCUIYcUk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JCUIYcUk.exe = "C:\\ProgramData\\rUAQcwIQ\\JCUIYcUk.exe" QgQYUAww.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\eUUUwcUI\PKkgQoEs QgQYUAww.exe File created C:\Windows\SysWOW64\shell32.dll.exe PKkgQoEs.exe File opened for modification C:\Windows\SysWOW64\sheImportPublish.jpg PKkgQoEs.exe File opened for modification C:\Windows\SysWOW64\sheRegisterLimit.pdf PKkgQoEs.exe File opened for modification C:\Windows\SysWOW64\sheUseDismount.rar PKkgQoEs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\eUUUwcUI QgQYUAww.exe File opened for modification C:\Windows\SysWOW64\sheDisableConvertFrom.mp3 PKkgQoEs.exe File opened for modification C:\Windows\SysWOW64\sheGroupConnect.zip PKkgQoEs.exe File opened for modification C:\Windows\SysWOW64\sheReceiveSplit.png PKkgQoEs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 3724 reg.exe 3408 reg.exe 4632 reg.exe 1068 reg.exe 2748 reg.exe 3368 reg.exe 4932 reg.exe 1084 reg.exe 2532 reg.exe 3556 reg.exe 536 reg.exe 1484 reg.exe 1804 reg.exe 1860 reg.exe 3932 reg.exe 4148 reg.exe 3520 reg.exe 3500 reg.exe 1516 reg.exe 5072 reg.exe 456 reg.exe 1784 reg.exe 2532 reg.exe 4584 reg.exe 2760 reg.exe 4132 reg.exe 2852 reg.exe 1392 reg.exe 3696 reg.exe 1660 reg.exe 1932 reg.exe 2344 reg.exe 4424 reg.exe 2448 reg.exe 4216 reg.exe 2060 reg.exe 3780 reg.exe 64 reg.exe 4492 reg.exe 5104 reg.exe 2712 reg.exe 2088 reg.exe 3768 reg.exe 4292 reg.exe 2288 reg.exe 3724 reg.exe 4624 reg.exe 1348 reg.exe 4132 reg.exe 4224 reg.exe 4216 reg.exe 2604 reg.exe 4104 reg.exe 3116 reg.exe 952 reg.exe 4040 reg.exe 3500 reg.exe 1516 reg.exe 1356 reg.exe 2020 reg.exe 4800 reg.exe 2604 reg.exe 3648 reg.exe 4724 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2548 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2548 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2548 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2548 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1840 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1840 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1840 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1840 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1256 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1256 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1256 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1256 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 5000 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 5000 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 5000 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 5000 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 4492 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 4492 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 4492 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 4492 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 3396 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 3396 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 3396 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 3396 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 4552 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 4552 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 4552 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 4552 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 4936 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 4936 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 4936 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 4936 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 3636 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 3636 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 3636 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 3636 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2404 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2404 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2404 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 2404 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1712 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1712 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1712 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1712 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1084 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1084 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1084 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 1084 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 3896 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 3896 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 3896 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 3896 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe 2412 PKkgQoEs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5024 wrote to memory of 2412 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 83 PID 5024 wrote to memory of 2412 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 83 PID 5024 wrote to memory of 2412 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 83 PID 5024 wrote to memory of 1224 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 84 PID 5024 wrote to memory of 1224 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 84 PID 5024 wrote to memory of 1224 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 84 PID 5024 wrote to memory of 4232 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 86 PID 5024 wrote to memory of 4232 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 86 PID 5024 wrote to memory of 4232 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 86 PID 4232 wrote to memory of 2564 4232 cmd.exe 88 PID 4232 wrote to memory of 2564 4232 cmd.exe 88 PID 4232 wrote to memory of 2564 4232 cmd.exe 88 PID 5024 wrote to memory of 320 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 89 PID 5024 wrote to memory of 320 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 89 PID 5024 wrote to memory of 320 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 89 PID 5024 wrote to memory of 216 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 90 PID 5024 wrote to memory of 216 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 90 PID 5024 wrote to memory of 216 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 90 PID 5024 wrote to memory of 2140 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 92 PID 5024 wrote to memory of 2140 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 92 PID 5024 wrote to memory of 2140 5024 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 92 PID 2564 wrote to memory of 1852 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 95 PID 2564 wrote to memory of 1852 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 95 PID 2564 wrote to memory of 1852 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 95 PID 1852 wrote to memory of 2648 1852 cmd.exe 97 PID 1852 wrote to memory of 2648 1852 cmd.exe 97 PID 1852 wrote to memory of 2648 1852 cmd.exe 97 PID 2564 wrote to memory of 1020 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 98 PID 2564 wrote to memory of 1020 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 98 PID 2564 wrote to memory of 1020 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 98 PID 2564 wrote to memory of 2288 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 99 PID 2564 wrote to memory of 2288 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 99 PID 2564 wrote to memory of 2288 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 99 PID 2564 wrote to memory of 4380 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 100 PID 2564 wrote to memory of 4380 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 100 PID 2564 wrote to memory of 4380 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 100 PID 2564 wrote to memory of 4212 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 103 PID 2564 wrote to memory of 4212 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 103 PID 2564 wrote to memory of 4212 2564 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 103 PID 2648 wrote to memory of 2376 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 106 PID 2648 wrote to memory of 2376 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 106 PID 2648 wrote to memory of 2376 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 106 PID 2648 wrote to memory of 4536 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 108 PID 2648 wrote to memory of 4536 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 108 PID 2648 wrote to memory of 4536 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 108 PID 2648 wrote to memory of 3672 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 110 PID 2648 wrote to memory of 3672 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 110 PID 2648 wrote to memory of 3672 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 110 PID 2648 wrote to memory of 3640 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 111 PID 2648 wrote to memory of 3640 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 111 PID 2648 wrote to memory of 3640 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 111 PID 2648 wrote to memory of 4220 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 114 PID 2648 wrote to memory of 4220 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 114 PID 2648 wrote to memory of 4220 2648 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 114 PID 2376 wrote to memory of 2548 2376 cmd.exe 116 PID 2376 wrote to memory of 2548 2376 cmd.exe 116 PID 2376 wrote to memory of 2548 2376 cmd.exe 116 PID 2548 wrote to memory of 2532 2548 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 117 PID 2548 wrote to memory of 2532 2548 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 117 PID 2548 wrote to memory of 2532 2548 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 117 PID 2548 wrote to memory of 4864 2548 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 119 PID 2548 wrote to memory of 4864 2548 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 119 PID 2548 wrote to memory of 4864 2548 cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe 119 PID 2532 wrote to memory of 1840 2532 cmd.exe 120 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe"C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\eUUUwcUI\PKkgQoEs.exe"C:\Users\Admin\eUUUwcUI\PKkgQoEs.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:2412
-
-
C:\ProgramData\rUAQcwIQ\JCUIYcUk.exe"C:\ProgramData\rUAQcwIQ\JCUIYcUk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"2⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a683⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"4⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a685⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"6⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a687⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"8⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a689⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"10⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6811⤵
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"12⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6813⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"14⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6815⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"16⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6817⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"18⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6819⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"20⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6821⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"22⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6823⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"24⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6825⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"26⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6827⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"28⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6829⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"30⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6831⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"32⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6833⤵PID:2532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"34⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6835⤵PID:2220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"36⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6837⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"38⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6839⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"40⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6841⤵PID:5056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"42⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6843⤵PID:2604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"44⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6845⤵PID:2320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"46⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6847⤵PID:4400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"48⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6849⤵PID:1828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"50⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6851⤵PID:4344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"52⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6853⤵PID:3100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"54⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6855⤵PID:1072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"56⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6857⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"58⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6859⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"60⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6861⤵PID:4128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"62⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6863⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"64⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6865⤵PID:4056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"66⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6867⤵PID:2404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"68⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6869⤵PID:3636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"70⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6871⤵PID:3212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"72⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6873⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"74⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6875⤵PID:1468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"76⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6877⤵PID:2600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"78⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6879⤵PID:3692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"80⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6881⤵PID:816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"82⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6883⤵PID:3228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"84⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6885⤵PID:5056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"86⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6887⤵PID:5076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"88⤵PID:4312
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:4216
-
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6889⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"90⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6891⤵PID:4752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"92⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6893⤵PID:2860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"94⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6895⤵PID:3412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"96⤵PID:3852
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵
- Modifies visibility of file extensions in Explorer
PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6897⤵PID:1584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"98⤵PID:4152
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a6899⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"100⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68101⤵PID:1460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"102⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68103⤵PID:3720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"104⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68105⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"106⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68107⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"108⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68109⤵PID:3824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"110⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68111⤵PID:5108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"112⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68113⤵PID:980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"114⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68115⤵PID:1712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"116⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68117⤵PID:3776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"118⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68119⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"120⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68.exeC:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68121⤵PID:4104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc5c0affeac86067994bfd1d5cac6a6e784d02797ae8ed27602c2d1ea3428a68"122⤵PID:4672
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-