Analysis
-
max time kernel
143s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 19:26
Static task
static1
Behavioral task
behavioral1
Sample
c24601317ac7790b94552d94d91e93b8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c24601317ac7790b94552d94d91e93b8.exe
Resource
win10v2004-20230220-en
General
-
Target
c24601317ac7790b94552d94d91e93b8.exe
-
Size
198KB
-
MD5
c24601317ac7790b94552d94d91e93b8
-
SHA1
5360294d421ce78a701fe14f2ac40376a6900bd4
-
SHA256
e8c370012027c85f0ef910fa25385d8e8652df038cb9ac71294fc744334b215e
-
SHA512
5c525b6838058cad8eedc78fb2dd277c76561f286ffa7a8cd36214f071cb4c3793f7d59190a1c7b83c996afb5344dc480d62de4541d47cf8399aaeea85966ca0
-
SSDEEP
3072:x81f/IOU5/r2RF9gb4Lp3p4dil/c0wbXODCJ8wU5MTnqIH+ejcNC:Kh/LA09yspZKuE7XOAHBTnqecN
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" c24601317ac7790b94552d94d91e93b8.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found -
Executes dropped EXE 2 IoCs
pid Process 1772 JWwsYQIs.exe 3608 GAkoEcgM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JWwsYQIs.exe = "C:\\Users\\Admin\\LMkgcYkI\\JWwsYQIs.exe" c24601317ac7790b94552d94d91e93b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JWwsYQIs.exe = "C:\\Users\\Admin\\LMkgcYkI\\JWwsYQIs.exe" JWwsYQIs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GAkoEcgM.exe = "C:\\ProgramData\\MAUkYEYU\\GAkoEcgM.exe" c24601317ac7790b94552d94d91e93b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GAkoEcgM.exe = "C:\\ProgramData\\MAUkYEYU\\GAkoEcgM.exe" GAkoEcgM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LsQUYEwA.exe = "C:\\Users\\Admin\\WkkowIsY\\LsQUYEwA.exe" c24601317ac7790b94552d94d91e93b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sUYkIcws.exe = "C:\\ProgramData\\kqwUgEEE\\sUYkIcws.exe" c24601317ac7790b94552d94d91e93b8.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c24601317ac7790b94552d94d91e93b8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c24601317ac7790b94552d94d91e93b8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c24601317ac7790b94552d94d91e93b8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c24601317ac7790b94552d94d91e93b8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1880 3576 WerFault.exe 1016 1120 4440 WerFault.exe 1015 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1740 reg.exe 3464 Process not Found 2472 Process not Found 5116 Process not Found 1952 Process not Found 840 Process not Found 1800 reg.exe 4032 reg.exe 4448 reg.exe 2728 reg.exe 5104 reg.exe 4344 reg.exe 4612 Process not Found 4792 Process not Found 2088 Process not Found 4480 reg.exe 4700 Process not Found 2124 Process not Found 836 reg.exe 3552 reg.exe 1368 reg.exe 4576 reg.exe 4872 reg.exe 3244 reg.exe 3336 reg.exe 3364 Process not Found 4724 reg.exe 2168 reg.exe 1612 Process not Found 5000 reg.exe 8 reg.exe 1188 reg.exe 1952 Process not Found 4960 Process not Found 4792 reg.exe 4268 reg.exe 5020 reg.exe 2892 Process not Found 3436 Process not Found 2256 Process not Found 1812 reg.exe 3772 reg.exe 4864 reg.exe 4392 reg.exe 420 Process not Found 2776 reg.exe 4892 reg.exe 5020 reg.exe 1644 reg.exe 4588 reg.exe 1704 reg.exe 4668 Process not Found 236 Process not Found 4964 Process not Found 4452 Process not Found 3868 Process not Found 4992 Process not Found 744 reg.exe 3612 reg.exe 4152 reg.exe 1972 reg.exe 3336 reg.exe 4304 reg.exe 2036 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1776 c24601317ac7790b94552d94d91e93b8.exe 1776 c24601317ac7790b94552d94d91e93b8.exe 1776 c24601317ac7790b94552d94d91e93b8.exe 1776 c24601317ac7790b94552d94d91e93b8.exe 2780 c24601317ac7790b94552d94d91e93b8.exe 2780 c24601317ac7790b94552d94d91e93b8.exe 2780 c24601317ac7790b94552d94d91e93b8.exe 2780 c24601317ac7790b94552d94d91e93b8.exe 4044 c24601317ac7790b94552d94d91e93b8.exe 4044 c24601317ac7790b94552d94d91e93b8.exe 4044 c24601317ac7790b94552d94d91e93b8.exe 4044 c24601317ac7790b94552d94d91e93b8.exe 4696 c24601317ac7790b94552d94d91e93b8.exe 4696 c24601317ac7790b94552d94d91e93b8.exe 4696 c24601317ac7790b94552d94d91e93b8.exe 4696 c24601317ac7790b94552d94d91e93b8.exe 1176 c24601317ac7790b94552d94d91e93b8.exe 1176 c24601317ac7790b94552d94d91e93b8.exe 1176 c24601317ac7790b94552d94d91e93b8.exe 1176 c24601317ac7790b94552d94d91e93b8.exe 4056 c24601317ac7790b94552d94d91e93b8.exe 4056 c24601317ac7790b94552d94d91e93b8.exe 4056 c24601317ac7790b94552d94d91e93b8.exe 4056 c24601317ac7790b94552d94d91e93b8.exe 4276 c24601317ac7790b94552d94d91e93b8.exe 4276 c24601317ac7790b94552d94d91e93b8.exe 4276 c24601317ac7790b94552d94d91e93b8.exe 4276 c24601317ac7790b94552d94d91e93b8.exe 2552 c24601317ac7790b94552d94d91e93b8.exe 2552 c24601317ac7790b94552d94d91e93b8.exe 2552 c24601317ac7790b94552d94d91e93b8.exe 2552 c24601317ac7790b94552d94d91e93b8.exe 3104 c24601317ac7790b94552d94d91e93b8.exe 3104 c24601317ac7790b94552d94d91e93b8.exe 3104 c24601317ac7790b94552d94d91e93b8.exe 3104 c24601317ac7790b94552d94d91e93b8.exe 4068 c24601317ac7790b94552d94d91e93b8.exe 4068 c24601317ac7790b94552d94d91e93b8.exe 4068 c24601317ac7790b94552d94d91e93b8.exe 4068 c24601317ac7790b94552d94d91e93b8.exe 2100 c24601317ac7790b94552d94d91e93b8.exe 2100 c24601317ac7790b94552d94d91e93b8.exe 2100 c24601317ac7790b94552d94d91e93b8.exe 2100 c24601317ac7790b94552d94d91e93b8.exe 2212 c24601317ac7790b94552d94d91e93b8.exe 2212 c24601317ac7790b94552d94d91e93b8.exe 2212 c24601317ac7790b94552d94d91e93b8.exe 2212 c24601317ac7790b94552d94d91e93b8.exe 3244 c24601317ac7790b94552d94d91e93b8.exe 3244 c24601317ac7790b94552d94d91e93b8.exe 3244 c24601317ac7790b94552d94d91e93b8.exe 3244 c24601317ac7790b94552d94d91e93b8.exe 4328 c24601317ac7790b94552d94d91e93b8.exe 4328 c24601317ac7790b94552d94d91e93b8.exe 4328 c24601317ac7790b94552d94d91e93b8.exe 4328 c24601317ac7790b94552d94d91e93b8.exe 4492 c24601317ac7790b94552d94d91e93b8.exe 4492 c24601317ac7790b94552d94d91e93b8.exe 4492 c24601317ac7790b94552d94d91e93b8.exe 4492 c24601317ac7790b94552d94d91e93b8.exe 4728 c24601317ac7790b94552d94d91e93b8.exe 4728 c24601317ac7790b94552d94d91e93b8.exe 4728 c24601317ac7790b94552d94d91e93b8.exe 4728 c24601317ac7790b94552d94d91e93b8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1772 1776 c24601317ac7790b94552d94d91e93b8.exe 82 PID 1776 wrote to memory of 1772 1776 c24601317ac7790b94552d94d91e93b8.exe 82 PID 1776 wrote to memory of 1772 1776 c24601317ac7790b94552d94d91e93b8.exe 82 PID 1776 wrote to memory of 3608 1776 c24601317ac7790b94552d94d91e93b8.exe 83 PID 1776 wrote to memory of 3608 1776 c24601317ac7790b94552d94d91e93b8.exe 83 PID 1776 wrote to memory of 3608 1776 c24601317ac7790b94552d94d91e93b8.exe 83 PID 1776 wrote to memory of 2484 1776 c24601317ac7790b94552d94d91e93b8.exe 84 PID 1776 wrote to memory of 2484 1776 c24601317ac7790b94552d94d91e93b8.exe 84 PID 1776 wrote to memory of 2484 1776 c24601317ac7790b94552d94d91e93b8.exe 84 PID 1776 wrote to memory of 4032 1776 c24601317ac7790b94552d94d91e93b8.exe 86 PID 1776 wrote to memory of 4032 1776 c24601317ac7790b94552d94d91e93b8.exe 86 PID 1776 wrote to memory of 4032 1776 c24601317ac7790b94552d94d91e93b8.exe 86 PID 1776 wrote to memory of 5028 1776 c24601317ac7790b94552d94d91e93b8.exe 87 PID 1776 wrote to memory of 5028 1776 c24601317ac7790b94552d94d91e93b8.exe 87 PID 1776 wrote to memory of 5028 1776 c24601317ac7790b94552d94d91e93b8.exe 87 PID 1776 wrote to memory of 4448 1776 c24601317ac7790b94552d94d91e93b8.exe 89 PID 1776 wrote to memory of 4448 1776 c24601317ac7790b94552d94d91e93b8.exe 89 PID 1776 wrote to memory of 4448 1776 c24601317ac7790b94552d94d91e93b8.exe 89 PID 1776 wrote to memory of 4800 1776 c24601317ac7790b94552d94d91e93b8.exe 88 PID 1776 wrote to memory of 4800 1776 c24601317ac7790b94552d94d91e93b8.exe 88 PID 1776 wrote to memory of 4800 1776 c24601317ac7790b94552d94d91e93b8.exe 88 PID 2484 wrote to memory of 2780 2484 cmd.exe 93 PID 2484 wrote to memory of 2780 2484 cmd.exe 93 PID 2484 wrote to memory of 2780 2484 cmd.exe 93 PID 2780 wrote to memory of 4328 2780 c24601317ac7790b94552d94d91e93b8.exe 95 PID 2780 wrote to memory of 4328 2780 c24601317ac7790b94552d94d91e93b8.exe 95 PID 2780 wrote to memory of 4328 2780 c24601317ac7790b94552d94d91e93b8.exe 95 PID 2780 wrote to memory of 4120 2780 c24601317ac7790b94552d94d91e93b8.exe 97 PID 2780 wrote to memory of 4120 2780 c24601317ac7790b94552d94d91e93b8.exe 97 PID 2780 wrote to memory of 4120 2780 c24601317ac7790b94552d94d91e93b8.exe 97 PID 2780 wrote to memory of 4692 2780 c24601317ac7790b94552d94d91e93b8.exe 98 PID 2780 wrote to memory of 4692 2780 c24601317ac7790b94552d94d91e93b8.exe 98 PID 2780 wrote to memory of 4692 2780 c24601317ac7790b94552d94d91e93b8.exe 98 PID 2780 wrote to memory of 4340 2780 c24601317ac7790b94552d94d91e93b8.exe 100 PID 2780 wrote to memory of 4340 2780 c24601317ac7790b94552d94d91e93b8.exe 100 PID 2780 wrote to memory of 4340 2780 c24601317ac7790b94552d94d91e93b8.exe 100 PID 2780 wrote to memory of 4988 2780 c24601317ac7790b94552d94d91e93b8.exe 99 PID 2780 wrote to memory of 4988 2780 c24601317ac7790b94552d94d91e93b8.exe 99 PID 2780 wrote to memory of 4988 2780 c24601317ac7790b94552d94d91e93b8.exe 99 PID 4800 wrote to memory of 552 4800 cmd.exe 105 PID 4800 wrote to memory of 552 4800 cmd.exe 105 PID 4800 wrote to memory of 552 4800 cmd.exe 105 PID 4328 wrote to memory of 4044 4328 cmd.exe 106 PID 4328 wrote to memory of 4044 4328 cmd.exe 106 PID 4328 wrote to memory of 4044 4328 cmd.exe 106 PID 4988 wrote to memory of 1808 4988 cmd.exe 107 PID 4988 wrote to memory of 1808 4988 cmd.exe 107 PID 4988 wrote to memory of 1808 4988 cmd.exe 107 PID 4044 wrote to memory of 2292 4044 c24601317ac7790b94552d94d91e93b8.exe 108 PID 4044 wrote to memory of 2292 4044 c24601317ac7790b94552d94d91e93b8.exe 108 PID 4044 wrote to memory of 2292 4044 c24601317ac7790b94552d94d91e93b8.exe 108 PID 4044 wrote to memory of 3712 4044 c24601317ac7790b94552d94d91e93b8.exe 117 PID 4044 wrote to memory of 3712 4044 c24601317ac7790b94552d94d91e93b8.exe 117 PID 4044 wrote to memory of 3712 4044 c24601317ac7790b94552d94d91e93b8.exe 117 PID 4044 wrote to memory of 2028 4044 c24601317ac7790b94552d94d91e93b8.exe 110 PID 4044 wrote to memory of 2028 4044 c24601317ac7790b94552d94d91e93b8.exe 110 PID 4044 wrote to memory of 2028 4044 c24601317ac7790b94552d94d91e93b8.exe 110 PID 4044 wrote to memory of 4388 4044 c24601317ac7790b94552d94d91e93b8.exe 111 PID 4044 wrote to memory of 4388 4044 c24601317ac7790b94552d94d91e93b8.exe 111 PID 4044 wrote to memory of 4388 4044 c24601317ac7790b94552d94d91e93b8.exe 111 PID 4044 wrote to memory of 1468 4044 c24601317ac7790b94552d94d91e93b8.exe 116 PID 4044 wrote to memory of 1468 4044 c24601317ac7790b94552d94d91e93b8.exe 116 PID 4044 wrote to memory of 1468 4044 c24601317ac7790b94552d94d91e93b8.exe 116 PID 2292 wrote to memory of 4696 2292 cmd.exe 118 -
System policy modification 1 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c24601317ac7790b94552d94d91e93b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System c24601317ac7790b94552d94d91e93b8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System c24601317ac7790b94552d94d91e93b8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c24601317ac7790b94552d94d91e93b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exe"C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\LMkgcYkI\JWwsYQIs.exe"C:\Users\Admin\LMkgcYkI\JWwsYQIs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1772
-
-
C:\ProgramData\MAUkYEYU\GAkoEcgM.exe"C:\ProgramData\MAUkYEYU\GAkoEcgM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"2⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b83⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"4⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b85⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"6⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b87⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"8⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b89⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"10⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b811⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"12⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b813⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"14⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b815⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"16⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b817⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"18⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b819⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"20⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b821⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"22⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b823⤵
- Suspicious behavior: EnumeratesProcesses
PID:2212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"24⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b825⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"26⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b827⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"28⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b829⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"30⤵
- Modifies visibility of file extensions in Explorer
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b831⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"32⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b833⤵PID:368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"34⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b835⤵PID:1776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"36⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b837⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"38⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b839⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"40⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b841⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"42⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b843⤵PID:744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"44⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b845⤵PID:4856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"46⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b847⤵PID:2104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"48⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b849⤵PID:4396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"50⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b851⤵PID:1800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"52⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b853⤵PID:4160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"54⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b855⤵PID:4604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"56⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b857⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"58⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b859⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"60⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b861⤵PID:4492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"62⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b863⤵PID:2396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"64⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b865⤵PID:484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"66⤵PID:1780
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b867⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"68⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b869⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"70⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b871⤵PID:4116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"72⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b873⤵PID:4736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"74⤵PID:4728
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b875⤵PID:3204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"76⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b877⤵PID:1584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"78⤵PID:3244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:4152
-
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b879⤵PID:3716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"80⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b881⤵PID:232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"82⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b883⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"84⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b885⤵PID:2760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"86⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b887⤵PID:1288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"88⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b889⤵PID:2016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"90⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b891⤵PID:3700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"92⤵
- Checks whether UAC is enabled
- System policy modification
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b893⤵PID:3868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"94⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b895⤵PID:3536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"96⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b897⤵PID:4464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"98⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b899⤵PID:4868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"100⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8101⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"102⤵PID:4836
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8103⤵PID:4604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"104⤵PID:3272
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8105⤵PID:4252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"106⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8107⤵PID:1332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"108⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8109⤵
- Modifies visibility of file extensions in Explorer
PID:968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"110⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8111⤵PID:1632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"112⤵PID:5020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8113⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"114⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8115⤵PID:4028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"116⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8117⤵PID:1652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"118⤵PID:3360
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8119⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"120⤵PID:4496
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:748
-
-
C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8.exeC:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8121⤵PID:3800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c24601317ac7790b94552d94d91e93b8"122⤵PID:4396
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-