Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
8b78e36ce5fee3exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
8b78e36ce5fee3exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
8b78e36ce5fee3exeexeexeex.exe
-
Size
315KB
-
MD5
8b78e36ce5fee3a7afbfd2951b5d4e42
-
SHA1
9a9f217a02263cc6d662e0111d9f03872c55ce72
-
SHA256
228f0320b0a741d86dca0915a580c9c793e0e4f8f83139edfaf81ee900f4af38
-
SHA512
2a7d746763e22c5c8e56c89786c86cd92dad4b6247fb4fb319cab8a6b9553630388cea7ef31fee49aff0c2bc9b52bde82979108239f1eb88a305c2981f71de0a
-
SSDEEP
6144:Si+4B/StcWOkySsU7HjPD/NzNfFdE9WWbP94YQtHKnvCI1F7q:KI/NJMb3dfazKV
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 8b78e36ce5fee3exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 8b78e36ce5fee3exeexeexeex.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8b78e36ce5fee3exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8b78e36ce5fee3exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\CompressConfirm.png.exe nSkcEYUg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation nSkcEYUg.exe -
Executes dropped EXE 2 IoCs
pid Process 2264 WIAwMMQE.exe 4220 nSkcEYUg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIAwMMQE.exe = "C:\\Users\\Admin\\tccEUQAE\\WIAwMMQE.exe" 8b78e36ce5fee3exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nSkcEYUg.exe = "C:\\ProgramData\\amUMYwoM\\nSkcEYUg.exe" 8b78e36ce5fee3exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nSkcEYUg.exe = "C:\\ProgramData\\amUMYwoM\\nSkcEYUg.exe" nSkcEYUg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WIAwMMQE.exe = "C:\\Users\\Admin\\tccEUQAE\\WIAwMMQE.exe" WIAwMMQE.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8b78e36ce5fee3exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8b78e36ce5fee3exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8b78e36ce5fee3exeexeexeex.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8b78e36ce5fee3exeexeexeex.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe nSkcEYUg.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe nSkcEYUg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3604 5076 WerFault.exe 889 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2628 reg.exe 552 reg.exe 372 reg.exe 5000 reg.exe 1072 reg.exe 3920 reg.exe 1392 reg.exe 1512 reg.exe 4292 reg.exe 2224 reg.exe 3532 reg.exe 2992 reg.exe 4104 reg.exe 2192 reg.exe 2928 reg.exe 2980 reg.exe 4800 reg.exe 3228 reg.exe 2648 reg.exe 1856 reg.exe 2360 reg.exe 2980 reg.exe 2764 reg.exe 3700 reg.exe 372 reg.exe 3616 reg.exe 372 reg.exe 4300 reg.exe 1940 reg.exe 3620 reg.exe 472 reg.exe 3632 reg.exe 1040 reg.exe 3464 reg.exe 1308 reg.exe 560 reg.exe 1612 reg.exe 3720 reg.exe 3732 reg.exe 1972 reg.exe 4816 reg.exe 4460 reg.exe 1468 reg.exe 3708 reg.exe 3052 reg.exe 3924 reg.exe 5080 reg.exe 3024 reg.exe 2076 reg.exe 4312 reg.exe 2916 reg.exe 2040 reg.exe 4008 reg.exe 2928 reg.exe 1612 reg.exe 3632 reg.exe 932 reg.exe 3316 reg.exe 4656 reg.exe 2008 reg.exe 1856 reg.exe 1488 reg.exe 4940 reg.exe 4756 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3632 8b78e36ce5fee3exeexeexeex.exe 3632 8b78e36ce5fee3exeexeexeex.exe 3632 8b78e36ce5fee3exeexeexeex.exe 3632 8b78e36ce5fee3exeexeexeex.exe 4412 8b78e36ce5fee3exeexeexeex.exe 4412 8b78e36ce5fee3exeexeexeex.exe 4412 8b78e36ce5fee3exeexeexeex.exe 4412 8b78e36ce5fee3exeexeexeex.exe 3756 8b78e36ce5fee3exeexeexeex.exe 3756 8b78e36ce5fee3exeexeexeex.exe 3756 8b78e36ce5fee3exeexeexeex.exe 3756 8b78e36ce5fee3exeexeexeex.exe 4680 Process not Found 4680 Process not Found 4680 Process not Found 4680 Process not Found 2900 8b78e36ce5fee3exeexeexeex.exe 2900 8b78e36ce5fee3exeexeexeex.exe 2900 8b78e36ce5fee3exeexeexeex.exe 2900 8b78e36ce5fee3exeexeexeex.exe 4236 Conhost.exe 4236 Conhost.exe 4236 Conhost.exe 4236 Conhost.exe 1428 8b78e36ce5fee3exeexeexeex.exe 1428 8b78e36ce5fee3exeexeexeex.exe 1428 8b78e36ce5fee3exeexeexeex.exe 1428 8b78e36ce5fee3exeexeexeex.exe 5008 8b78e36ce5fee3exeexeexeex.exe 5008 8b78e36ce5fee3exeexeexeex.exe 5008 8b78e36ce5fee3exeexeexeex.exe 5008 8b78e36ce5fee3exeexeexeex.exe 2360 Conhost.exe 2360 Conhost.exe 2360 Conhost.exe 2360 Conhost.exe 2672 8b78e36ce5fee3exeexeexeex.exe 2672 8b78e36ce5fee3exeexeexeex.exe 2672 8b78e36ce5fee3exeexeexeex.exe 2672 8b78e36ce5fee3exeexeexeex.exe 224 reg.exe 224 reg.exe 224 reg.exe 224 reg.exe 4284 reg.exe 4284 reg.exe 4284 reg.exe 4284 reg.exe 1488 reg.exe 1488 reg.exe 1488 reg.exe 1488 reg.exe 4564 8b78e36ce5fee3exeexeexeex.exe 4564 8b78e36ce5fee3exeexeexeex.exe 4564 8b78e36ce5fee3exeexeexeex.exe 4564 8b78e36ce5fee3exeexeexeex.exe 4784 8b78e36ce5fee3exeexeexeex.exe 4784 8b78e36ce5fee3exeexeexeex.exe 4784 8b78e36ce5fee3exeexeexeex.exe 4784 8b78e36ce5fee3exeexeexeex.exe 4700 cmd.exe 4700 cmd.exe 4700 cmd.exe 4700 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4220 nSkcEYUg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe 4220 nSkcEYUg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3632 wrote to memory of 2264 3632 8b78e36ce5fee3exeexeexeex.exe 84 PID 3632 wrote to memory of 2264 3632 8b78e36ce5fee3exeexeexeex.exe 84 PID 3632 wrote to memory of 2264 3632 8b78e36ce5fee3exeexeexeex.exe 84 PID 3632 wrote to memory of 4220 3632 8b78e36ce5fee3exeexeexeex.exe 85 PID 3632 wrote to memory of 4220 3632 8b78e36ce5fee3exeexeexeex.exe 85 PID 3632 wrote to memory of 4220 3632 8b78e36ce5fee3exeexeexeex.exe 85 PID 3632 wrote to memory of 4832 3632 8b78e36ce5fee3exeexeexeex.exe 86 PID 3632 wrote to memory of 4832 3632 8b78e36ce5fee3exeexeexeex.exe 86 PID 3632 wrote to memory of 4832 3632 8b78e36ce5fee3exeexeexeex.exe 86 PID 3632 wrote to memory of 3700 3632 8b78e36ce5fee3exeexeexeex.exe 88 PID 3632 wrote to memory of 3700 3632 8b78e36ce5fee3exeexeexeex.exe 88 PID 3632 wrote to memory of 3700 3632 8b78e36ce5fee3exeexeexeex.exe 88 PID 3632 wrote to memory of 3876 3632 8b78e36ce5fee3exeexeexeex.exe 89 PID 3632 wrote to memory of 3876 3632 8b78e36ce5fee3exeexeexeex.exe 89 PID 3632 wrote to memory of 3876 3632 8b78e36ce5fee3exeexeexeex.exe 89 PID 3632 wrote to memory of 2260 3632 8b78e36ce5fee3exeexeexeex.exe 92 PID 3632 wrote to memory of 2260 3632 8b78e36ce5fee3exeexeexeex.exe 92 PID 3632 wrote to memory of 2260 3632 8b78e36ce5fee3exeexeexeex.exe 92 PID 3632 wrote to memory of 2456 3632 8b78e36ce5fee3exeexeexeex.exe 90 PID 3632 wrote to memory of 2456 3632 8b78e36ce5fee3exeexeexeex.exe 90 PID 3632 wrote to memory of 2456 3632 8b78e36ce5fee3exeexeexeex.exe 90 PID 4832 wrote to memory of 4412 4832 cmd.exe 95 PID 4832 wrote to memory of 4412 4832 cmd.exe 95 PID 4832 wrote to memory of 4412 4832 cmd.exe 95 PID 4412 wrote to memory of 2036 4412 8b78e36ce5fee3exeexeexeex.exe 98 PID 4412 wrote to memory of 2036 4412 8b78e36ce5fee3exeexeexeex.exe 98 PID 4412 wrote to memory of 2036 4412 8b78e36ce5fee3exeexeexeex.exe 98 PID 2456 wrote to memory of 1632 2456 cmd.exe 99 PID 2456 wrote to memory of 1632 2456 cmd.exe 99 PID 2456 wrote to memory of 1632 2456 cmd.exe 99 PID 2036 wrote to memory of 3756 2036 cmd.exe 100 PID 2036 wrote to memory of 3756 2036 cmd.exe 100 PID 2036 wrote to memory of 3756 2036 cmd.exe 100 PID 4412 wrote to memory of 3620 4412 8b78e36ce5fee3exeexeexeex.exe 101 PID 4412 wrote to memory of 3620 4412 8b78e36ce5fee3exeexeexeex.exe 101 PID 4412 wrote to memory of 3620 4412 8b78e36ce5fee3exeexeexeex.exe 101 PID 4412 wrote to memory of 4052 4412 8b78e36ce5fee3exeexeexeex.exe 102 PID 4412 wrote to memory of 4052 4412 8b78e36ce5fee3exeexeexeex.exe 102 PID 4412 wrote to memory of 4052 4412 8b78e36ce5fee3exeexeexeex.exe 102 PID 4412 wrote to memory of 4652 4412 8b78e36ce5fee3exeexeexeex.exe 103 PID 4412 wrote to memory of 4652 4412 8b78e36ce5fee3exeexeexeex.exe 103 PID 4412 wrote to memory of 4652 4412 8b78e36ce5fee3exeexeexeex.exe 103 PID 4412 wrote to memory of 4224 4412 8b78e36ce5fee3exeexeexeex.exe 104 PID 4412 wrote to memory of 4224 4412 8b78e36ce5fee3exeexeexeex.exe 104 PID 4412 wrote to memory of 4224 4412 8b78e36ce5fee3exeexeexeex.exe 104 PID 3756 wrote to memory of 4892 3756 8b78e36ce5fee3exeexeexeex.exe 109 PID 3756 wrote to memory of 4892 3756 8b78e36ce5fee3exeexeexeex.exe 109 PID 3756 wrote to memory of 4892 3756 8b78e36ce5fee3exeexeexeex.exe 109 PID 4224 wrote to memory of 4504 4224 cmd.exe 111 PID 4224 wrote to memory of 4504 4224 cmd.exe 111 PID 4224 wrote to memory of 4504 4224 cmd.exe 111 PID 3756 wrote to memory of 2980 3756 8b78e36ce5fee3exeexeexeex.exe 112 PID 3756 wrote to memory of 2980 3756 8b78e36ce5fee3exeexeexeex.exe 112 PID 3756 wrote to memory of 2980 3756 8b78e36ce5fee3exeexeexeex.exe 112 PID 3756 wrote to memory of 560 3756 8b78e36ce5fee3exeexeexeex.exe 115 PID 3756 wrote to memory of 560 3756 8b78e36ce5fee3exeexeexeex.exe 115 PID 3756 wrote to memory of 560 3756 8b78e36ce5fee3exeexeexeex.exe 115 PID 3756 wrote to memory of 1116 3756 8b78e36ce5fee3exeexeexeex.exe 114 PID 3756 wrote to memory of 1116 3756 8b78e36ce5fee3exeexeexeex.exe 114 PID 3756 wrote to memory of 1116 3756 8b78e36ce5fee3exeexeexeex.exe 114 PID 3756 wrote to memory of 2344 3756 8b78e36ce5fee3exeexeexeex.exe 113 PID 3756 wrote to memory of 2344 3756 8b78e36ce5fee3exeexeexeex.exe 113 PID 3756 wrote to memory of 2344 3756 8b78e36ce5fee3exeexeexeex.exe 113 PID 4892 wrote to memory of 4680 4892 cmd.exe 120 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8b78e36ce5fee3exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 8b78e36ce5fee3exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 8b78e36ce5fee3exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8b78e36ce5fee3exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\tccEUQAE\WIAwMMQE.exe"C:\Users\Admin\tccEUQAE\WIAwMMQE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2264
-
-
C:\ProgramData\amUMYwoM\nSkcEYUg.exe"C:\ProgramData\amUMYwoM\nSkcEYUg.exe"2⤵
- Modifies extensions of user files
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"6⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex7⤵PID:4680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"8⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"10⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex11⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"12⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"14⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"16⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex17⤵PID:2360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"18⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"20⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex21⤵PID:224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"22⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex23⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"24⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex25⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"26⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"28⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"30⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex31⤵PID:4700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"32⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex33⤵PID:2500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"34⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex35⤵PID:4116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"36⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex37⤵PID:1404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"38⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex39⤵PID:4108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"40⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex41⤵PID:2344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"42⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex43⤵PID:2884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"44⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex45⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"46⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex47⤵PID:2192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"48⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex49⤵PID:2896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"50⤵PID:2068
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex51⤵PID:1068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"52⤵PID:4792
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex53⤵PID:4032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"54⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex55⤵PID:5084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"56⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex57⤵PID:444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"58⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex59⤵PID:4516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"60⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex61⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"62⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex63⤵PID:2640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"64⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex65⤵PID:5036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"66⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex67⤵PID:3924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"68⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex69⤵PID:4036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"70⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex71⤵PID:4752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"72⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex73⤵PID:1188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"74⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex75⤵
- Modifies visibility of file extensions in Explorer
PID:4940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"76⤵
- Modifies visibility of file extensions in Explorer
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex77⤵
- Modifies visibility of file extensions in Explorer
PID:1392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"78⤵PID:3840
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex79⤵PID:232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"80⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex81⤵PID:216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"82⤵PID:5068
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex83⤵PID:4188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"84⤵PID:1704
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵
- UAC bypass
PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex85⤵PID:4212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"86⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex87⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"88⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2980 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:3168
-
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex89⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"90⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex91⤵PID:1920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"92⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex93⤵PID:1468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"94⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex95⤵PID:3796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"96⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex97⤵PID:3928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"98⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex99⤵PID:420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"100⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex101⤵PID:2616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"102⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex103⤵PID:932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"104⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex105⤵PID:2464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"106⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex107⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"108⤵PID:888
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex109⤵PID:2908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"110⤵PID:3992
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex111⤵PID:4216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"112⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex113⤵PID:4992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"114⤵PID:1968
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex115⤵PID:5100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"116⤵PID:4080
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex117⤵PID:2464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"118⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex119⤵PID:1452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"120⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex121⤵PID:3304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8b78e36ce5fee3exeexeexeex"122⤵PID:2832
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-