Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
1a1e0dadede90fff9bc3e115c3e71da6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a1e0dadede90fff9bc3e115c3e71da6.exe
Resource
win10v2004-20231215-en
General
-
Target
1a1e0dadede90fff9bc3e115c3e71da6.exe
-
Size
484KB
-
MD5
1a1e0dadede90fff9bc3e115c3e71da6
-
SHA1
58c93beec97df100f565ab9533353cd456a72380
-
SHA256
b5bc9eba7dea50a283115771c3e3c0c7a25333ce729537fc96fc8782e4767128
-
SHA512
88058ea2048be2f80128654c743e57b01fa02bd1987b50324b0c44cca345789b7509bc063faadabb6c1a024a4ae29a49c63b8a1a61bea4f79de39c308199201f
-
SSDEEP
6144:Y03U3tjQGgI/NaqEuaIhI/Igpzuf8B6O13ALfTeotio/wwp7LBHpY9yTirt3O1hs:Y03ZGrIq9V6IaG1Q3GfhtFZl6XUS4EN
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1a1e0dadede90fff9bc3e115c3e71da6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" BackgroundTransferHost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2636 qKgooUgY.exe 3320 buYwkcQA.exe 4840 SYwUAkUg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\buYwkcQA.exe = "C:\\ProgramData\\ZiscsYYA\\buYwkcQA.exe" SYwUAkUg.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qKgooUgY.exe = "C:\\Users\\Admin\\GsMwcoIw\\qKgooUgY.exe" 1a1e0dadede90fff9bc3e115c3e71da6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\buYwkcQA.exe = "C:\\ProgramData\\ZiscsYYA\\buYwkcQA.exe" 1a1e0dadede90fff9bc3e115c3e71da6.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qKgooUgY.exe = "C:\\Users\\Admin\\GsMwcoIw\\qKgooUgY.exe" qKgooUgY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\buYwkcQA.exe = "C:\\ProgramData\\ZiscsYYA\\buYwkcQA.exe" buYwkcQA.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1a1e0dadede90fff9bc3e115c3e71da6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1a1e0dadede90fff9bc3e115c3e71da6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1a1e0dadede90fff9bc3e115c3e71da6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1a1e0dadede90fff9bc3e115c3e71da6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\GsMwcoIw SYwUAkUg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\GsMwcoIw\qKgooUgY SYwUAkUg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 3084 reg.exe 5660 reg.exe 5264 reg.exe 4016 reg.exe 2780 reg.exe 4940 reg.exe 2120 reg.exe 4508 reg.exe 3068 reg.exe 4136 reg.exe 2072 reg.exe 4884 reg.exe 5592 reg.exe 5144 reg.exe 3172 reg.exe 5240 reg.exe 4768 reg.exe 1812 reg.exe 4624 reg.exe 1416 reg.exe 5508 reg.exe 1668 reg.exe 460 reg.exe 1996 reg.exe 5688 reg.exe 1716 reg.exe 2788 reg.exe 5284 reg.exe 5984 reg.exe 5528 reg.exe 768 reg.exe 688 reg.exe 1196 reg.exe 4384 reg.exe 1836 reg.exe 6068 reg.exe 4884 reg.exe 2952 reg.exe 864 reg.exe 3464 reg.exe 2164 reg.exe 1736 reg.exe 5380 reg.exe 3200 reg.exe 3848 reg.exe 2200 reg.exe 5308 reg.exe 1348 reg.exe 2188 reg.exe 3984 reg.exe 5468 reg.exe 5264 reg.exe 3640 reg.exe 1652 reg.exe 5332 reg.exe 384 reg.exe 5788 reg.exe 1848 reg.exe 4020 reg.exe 5984 reg.exe 2200 reg.exe 5204 reg.exe 3192 reg.exe 1564 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 2780 1a1e0dadede90fff9bc3e115c3e71da6.exe 2780 1a1e0dadede90fff9bc3e115c3e71da6.exe 2780 1a1e0dadede90fff9bc3e115c3e71da6.exe 2780 1a1e0dadede90fff9bc3e115c3e71da6.exe 5068 1a1e0dadede90fff9bc3e115c3e71da6.exe 5068 1a1e0dadede90fff9bc3e115c3e71da6.exe 5068 1a1e0dadede90fff9bc3e115c3e71da6.exe 5068 1a1e0dadede90fff9bc3e115c3e71da6.exe 440 1a1e0dadede90fff9bc3e115c3e71da6.exe 440 1a1e0dadede90fff9bc3e115c3e71da6.exe 440 1a1e0dadede90fff9bc3e115c3e71da6.exe 440 1a1e0dadede90fff9bc3e115c3e71da6.exe 2060 1a1e0dadede90fff9bc3e115c3e71da6.exe 2060 1a1e0dadede90fff9bc3e115c3e71da6.exe 2060 1a1e0dadede90fff9bc3e115c3e71da6.exe 2060 1a1e0dadede90fff9bc3e115c3e71da6.exe 4200 1a1e0dadede90fff9bc3e115c3e71da6.exe 4200 1a1e0dadede90fff9bc3e115c3e71da6.exe 4200 1a1e0dadede90fff9bc3e115c3e71da6.exe 4200 1a1e0dadede90fff9bc3e115c3e71da6.exe 2872 1a1e0dadede90fff9bc3e115c3e71da6.exe 2872 1a1e0dadede90fff9bc3e115c3e71da6.exe 2872 1a1e0dadede90fff9bc3e115c3e71da6.exe 2872 1a1e0dadede90fff9bc3e115c3e71da6.exe 4212 1a1e0dadede90fff9bc3e115c3e71da6.exe 4212 1a1e0dadede90fff9bc3e115c3e71da6.exe 4212 1a1e0dadede90fff9bc3e115c3e71da6.exe 4212 1a1e0dadede90fff9bc3e115c3e71da6.exe 3592 1a1e0dadede90fff9bc3e115c3e71da6.exe 3592 1a1e0dadede90fff9bc3e115c3e71da6.exe 3592 1a1e0dadede90fff9bc3e115c3e71da6.exe 3592 1a1e0dadede90fff9bc3e115c3e71da6.exe 2060 1a1e0dadede90fff9bc3e115c3e71da6.exe 2060 1a1e0dadede90fff9bc3e115c3e71da6.exe 2060 1a1e0dadede90fff9bc3e115c3e71da6.exe 2060 1a1e0dadede90fff9bc3e115c3e71da6.exe 692 1a1e0dadede90fff9bc3e115c3e71da6.exe 692 1a1e0dadede90fff9bc3e115c3e71da6.exe 692 1a1e0dadede90fff9bc3e115c3e71da6.exe 692 1a1e0dadede90fff9bc3e115c3e71da6.exe 2356 1a1e0dadede90fff9bc3e115c3e71da6.exe 2356 1a1e0dadede90fff9bc3e115c3e71da6.exe 2356 1a1e0dadede90fff9bc3e115c3e71da6.exe 2356 1a1e0dadede90fff9bc3e115c3e71da6.exe 4276 1a1e0dadede90fff9bc3e115c3e71da6.exe 4276 1a1e0dadede90fff9bc3e115c3e71da6.exe 4276 1a1e0dadede90fff9bc3e115c3e71da6.exe 4276 1a1e0dadede90fff9bc3e115c3e71da6.exe 2992 1a1e0dadede90fff9bc3e115c3e71da6.exe 2992 1a1e0dadede90fff9bc3e115c3e71da6.exe 2992 1a1e0dadede90fff9bc3e115c3e71da6.exe 2992 1a1e0dadede90fff9bc3e115c3e71da6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2636 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 89 PID 2376 wrote to memory of 2636 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 89 PID 2376 wrote to memory of 2636 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 89 PID 2376 wrote to memory of 3320 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 91 PID 2376 wrote to memory of 3320 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 91 PID 2376 wrote to memory of 3320 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 91 PID 2376 wrote to memory of 3708 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 94 PID 2376 wrote to memory of 3708 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 94 PID 2376 wrote to memory of 3708 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 94 PID 3708 wrote to memory of 4016 3708 cmd.exe 96 PID 3708 wrote to memory of 4016 3708 cmd.exe 96 PID 3708 wrote to memory of 4016 3708 cmd.exe 96 PID 2376 wrote to memory of 4552 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 97 PID 2376 wrote to memory of 4552 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 97 PID 2376 wrote to memory of 4552 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 97 PID 2376 wrote to memory of 3552 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 102 PID 2376 wrote to memory of 3552 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 102 PID 2376 wrote to memory of 3552 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 102 PID 2376 wrote to memory of 4312 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 98 PID 2376 wrote to memory of 4312 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 98 PID 2376 wrote to memory of 4312 2376 1a1e0dadede90fff9bc3e115c3e71da6.exe 98 PID 4016 wrote to memory of 1564 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 103 PID 4016 wrote to memory of 1564 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 103 PID 4016 wrote to memory of 1564 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 103 PID 4016 wrote to memory of 4524 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 108 PID 4016 wrote to memory of 4524 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 108 PID 4016 wrote to memory of 4524 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 108 PID 4016 wrote to memory of 4624 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 107 PID 4016 wrote to memory of 4624 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 107 PID 4016 wrote to memory of 4624 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 107 PID 4016 wrote to memory of 452 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 105 PID 4016 wrote to memory of 452 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 105 PID 4016 wrote to memory of 452 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 105 PID 4016 wrote to memory of 1844 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 106 PID 4016 wrote to memory of 1844 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 106 PID 4016 wrote to memory of 1844 4016 1a1e0dadede90fff9bc3e115c3e71da6.exe 106 PID 1564 wrote to memory of 788 1564 cmd.exe 113 PID 1564 wrote to memory of 788 1564 cmd.exe 113 PID 1564 wrote to memory of 788 1564 cmd.exe 113 PID 788 wrote to memory of 3248 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 115 PID 788 wrote to memory of 3248 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 115 PID 788 wrote to memory of 3248 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 115 PID 788 wrote to memory of 3520 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 117 PID 788 wrote to memory of 3520 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 117 PID 788 wrote to memory of 3520 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 117 PID 788 wrote to memory of 1464 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 116 PID 788 wrote to memory of 1464 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 116 PID 788 wrote to memory of 1464 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 116 PID 788 wrote to memory of 640 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 119 PID 788 wrote to memory of 640 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 119 PID 788 wrote to memory of 640 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 119 PID 788 wrote to memory of 4744 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 118 PID 788 wrote to memory of 4744 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 118 PID 788 wrote to memory of 4744 788 1a1e0dadede90fff9bc3e115c3e71da6.exe 118 PID 3248 wrote to memory of 2780 3248 cmd.exe 120 PID 3248 wrote to memory of 2780 3248 cmd.exe 120 PID 3248 wrote to memory of 2780 3248 cmd.exe 120 PID 2780 wrote to memory of 1524 2780 1a1e0dadede90fff9bc3e115c3e71da6.exe 126 PID 2780 wrote to memory of 1524 2780 1a1e0dadede90fff9bc3e115c3e71da6.exe 126 PID 2780 wrote to memory of 1524 2780 1a1e0dadede90fff9bc3e115c3e71da6.exe 126 PID 2780 wrote to memory of 4860 2780 1a1e0dadede90fff9bc3e115c3e71da6.exe 131 PID 2780 wrote to memory of 4860 2780 1a1e0dadede90fff9bc3e115c3e71da6.exe 131 PID 2780 wrote to memory of 4860 2780 1a1e0dadede90fff9bc3e115c3e71da6.exe 131 PID 2780 wrote to memory of 3704 2780 1a1e0dadede90fff9bc3e115c3e71da6.exe 130 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 1a1e0dadede90fff9bc3e115c3e71da6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1a1e0dadede90fff9bc3e115c3e71da6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 1a1e0dadede90fff9bc3e115c3e71da6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1a1e0dadede90fff9bc3e115c3e71da6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe"C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\GsMwcoIw\qKgooUgY.exe"C:\Users\Admin\GsMwcoIw\qKgooUgY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2636
-
-
C:\ProgramData\ZiscsYYA\buYwkcQA.exe"C:\ProgramData\ZiscsYYA\buYwkcQA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"2⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da63⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"4⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da65⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"6⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da67⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"8⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da69⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"10⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da611⤵
- Suspicious behavior: EnumeratesProcesses
PID:440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"12⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da613⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"14⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da615⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"16⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da617⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"18⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da619⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"20⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da621⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"22⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da623⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"24⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da625⤵
- Suspicious behavior: EnumeratesProcesses
PID:692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"26⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da627⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"28⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da629⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"30⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da631⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"32⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da633⤵PID:4968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"34⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da635⤵PID:2432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"36⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da637⤵PID:4208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"38⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da639⤵PID:1544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"40⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da641⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"42⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da643⤵PID:5408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"44⤵PID:5496
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da645⤵PID:5540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"46⤵PID:5776
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da647⤵PID:6060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"48⤵PID:5160
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da649⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"50⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da651⤵PID:4668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"52⤵PID:5768
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da653⤵PID:3584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"54⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da655⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"56⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da657⤵PID:6032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"58⤵
- Modifies visibility of file extensions in Explorer
PID:5932 -
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da659⤵PID:3592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"60⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da661⤵PID:5676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"62⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da663⤵PID:5696
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵
- UAC bypass
PID:4944
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵PID:5580
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵PID:3844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"64⤵PID:5280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GwAkUkos.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""64⤵PID:4512
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵PID:3704
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵PID:1056
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵PID:4404
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:5592
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SUIQEAUM.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""62⤵PID:2992
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵PID:2492
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TooEkQYA.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""60⤵PID:5972
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵PID:2536
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
- UAC bypass
PID:4920
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵PID:2156
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵
- Modifies visibility of file extensions in Explorer
PID:4380
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tgEosIwQ.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""58⤵PID:5948
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵PID:5288
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
- UAC bypass
PID:5912
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵PID:3168
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵
- Modifies registry key
PID:5240
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hokswwcU.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""56⤵PID:5668
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs57⤵PID:4336
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
- Modifies registry key
PID:5788
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵
- Modifies registry key
PID:1348
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵PID:6012
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV156⤵
- Modifies visibility of file extensions in Explorer
PID:5636
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WEksYwEM.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""54⤵PID:4704
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵PID:3184
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵
- UAC bypass
PID:6076
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵
- Modifies registry key
PID:5308
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵PID:5724
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\akUcEEow.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""52⤵PID:6040
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:6060
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵PID:5748
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
- UAC bypass
- Modifies registry key
PID:5984
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵PID:5868
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵PID:5932
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- UAC bypass
- Modifies registry key
PID:5508
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵PID:5488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YWIgkgQo.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""50⤵PID:5412
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵PID:5416
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵PID:5164
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uakMQAEs.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""48⤵PID:2164
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵PID:5780
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
- Modifies registry key
PID:5264
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵
- Modifies registry key
PID:3084
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵PID:5184
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LWoAUgUo.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""46⤵PID:5880
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵PID:6084
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵PID:5864
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵PID:5856
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
- Modifies visibility of file extensions in Explorer
PID:5848
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies visibility of file extensions in Explorer
PID:5560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tSYUMsIc.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""44⤵PID:5592
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵PID:5788
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵PID:5576
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵PID:5568
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IsYwogIU.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""42⤵PID:5148
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵PID:5400
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- UAC bypass
PID:5128
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵PID:4772
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
- Modifies registry key
PID:1564
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies visibility of file extensions in Explorer
PID:3260
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
- Modifies registry key
PID:1716
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- Modifies registry key
PID:2164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xqQsIAII.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""40⤵PID:2060
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵PID:5436
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Modifies visibility of file extensions in Explorer
PID:2992
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵PID:4140
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
- UAC bypass
PID:4684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VCMwYIQQ.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""38⤵PID:232
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵PID:5224
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵PID:1680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DMcQckQw.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""36⤵PID:4296
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:1464
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵PID:4720
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵PID:1432
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mAUYIsks.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""34⤵PID:1340
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:1348
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵PID:4684
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵PID:3260
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies registry key
PID:3464
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vqcAQMUY.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""32⤵PID:4756
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:2436
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵PID:972
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵
- Modifies registry key
PID:2780
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1996
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies visibility of file extensions in Explorer
PID:3204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aegooQkE.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""30⤵PID:3496
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:4088
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- UAC bypass
PID:3192
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵PID:3328
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies visibility of file extensions in Explorer
PID:4140
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- UAC bypass
PID:2032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HWUAwIwo.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""28⤵PID:1488
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:3340
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:4048
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵PID:1956
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵PID:1708
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zYcoMcEk.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""26⤵PID:456
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:3200
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵PID:988
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies visibility of file extensions in Explorer
PID:4756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nuMcIsAI.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""24⤵PID:2428
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:2700
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- UAC bypass
PID:3248
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
- Modifies registry key
PID:384
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
PID:1524
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵PID:3464
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵PID:2780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pOggAgsA.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""22⤵PID:3660
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:4344
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies registry key
PID:1416
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:2240
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵PID:3516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FmMAUsoE.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""20⤵PID:3704
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:1836
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
PID:460
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- UAC bypass
PID:4892
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵PID:4512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\msQQMcgY.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""18⤵PID:1780
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:2140
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies visibility of file extensions in Explorer
PID:1920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QkogUoQY.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""16⤵PID:3480
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:3788
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- UAC bypass
- Modifies registry key
PID:3192
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
PID:1836
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵PID:3248
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵PID:1416
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵PID:3640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ICgkEAgU.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""14⤵PID:560
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:2744
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
PID:4016
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:4092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jygMAcMU.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""12⤵PID:884
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:3184
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵PID:3788
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
- Modifies registry key
PID:4384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WuYgEIkk.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""10⤵PID:4992
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:1624
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:3224
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵PID:456
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KEQUcckI.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""8⤵PID:3476
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:1140
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
PID:2076
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:3704
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵PID:4860
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:1464
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵PID:3520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QMYAQwks.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""6⤵PID:4744
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:2188
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵PID:640
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
PID:452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PeYEcwAA.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""4⤵PID:1844
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:1580
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:4624
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
PID:4524
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:4552
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:4312
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:3552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XyAQYwgE.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""2⤵PID:3988
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:5956
-
-
-
C:\ProgramData\VikEAQko\SYwUAkUg.exeC:\ProgramData\VikEAQko\SYwUAkUg.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4840
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- UAC bypass
PID:5864
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:6084
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da61⤵PID:5820
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:3340
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:6012
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:4556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"2⤵PID:5624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KwgEscAg.bat" "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exe""2⤵PID:2188
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:4992
-
-
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da61⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"2⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da63⤵PID:4940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"4⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da65⤵PID:1928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"6⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da67⤵PID:5340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"8⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da69⤵PID:5208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"10⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da611⤵PID:3340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"12⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da613⤵PID:5780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"14⤵PID:5696
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da615⤵PID:2808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"16⤵PID:5336
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da617⤵PID:5240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"18⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da619⤵PID:2468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"20⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da621⤵PID:5956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"22⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da623⤵PID:940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"24⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da625⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"26⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da627⤵PID:5780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"28⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da629⤵PID:6064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"30⤵PID:6032
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da631⤵PID:768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"32⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da633⤵PID:3984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"34⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da635⤵PID:5552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"36⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da637⤵PID:5764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"38⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da639⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"40⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da641⤵PID:4404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"42⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da643⤵PID:1976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"44⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da645⤵PID:6060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"46⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da647⤵PID:3988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"48⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da649⤵PID:3124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"50⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da651⤵PID:232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"52⤵PID:5764
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da653⤵PID:5432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"54⤵PID:5676
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da655⤵PID:5960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"56⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da657⤵PID:3420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"58⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da659⤵PID:5416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"60⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da661⤵PID:972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"62⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da663⤵PID:2032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"64⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da665⤵PID:3652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"66⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da667⤵PID:5764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"68⤵PID:3096
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:3728
-
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da669⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"70⤵PID:5340
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da671⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"72⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da673⤵PID:4256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"74⤵PID:5260
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da675⤵PID:5244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"76⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da677⤵PID:5776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"78⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da679⤵PID:456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"80⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da681⤵PID:5332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"82⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da683⤵PID:3844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"84⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da685⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"86⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da687⤵PID:5960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"88⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da689⤵PID:2740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"90⤵PID:1232
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da691⤵PID:4860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"92⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da693⤵PID:1848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"94⤵PID:5572
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:5612
-
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da695⤵PID:5820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"96⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da697⤵
- Checks whether UAC is enabled
- System policy modification
PID:5140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"98⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da699⤵PID:1844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"100⤵PID:1860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6101⤵PID:1652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"102⤵PID:5080
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6103⤵PID:4240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"104⤵PID:6116
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6105⤵PID:1464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"106⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6107⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"108⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6109⤵PID:5788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"110⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6111⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"112⤵PID:3116
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6113⤵PID:3480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"114⤵PID:6024
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6115⤵PID:5144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"116⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6117⤵PID:5896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"118⤵PID:5916
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6119⤵PID:5204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"120⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6.exeC:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6121⤵PID:1056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a1e0dadede90fff9bc3e115c3e71da6"122⤵PID:3728
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-