Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
cc0aba20f7299856b64bb471442d784b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc0aba20f7299856b64bb471442d784b.exe
Resource
win10v2004-20240226-en
General
-
Target
cc0aba20f7299856b64bb471442d784b.exe
-
Size
484KB
-
MD5
cc0aba20f7299856b64bb471442d784b
-
SHA1
d2e72b45d5a6f08210469ed14960a8461b04a829
-
SHA256
88e29b165f22416dab1e54c1470b5c054ec666e3ba41b0c4b6b750d034e3f759
-
SHA512
cc93aa2c1a48b08230609a7084db165148d509203360968d7152b52b8c201e5949b6f5a7ad65677371dd399f493c1b3dcec2f819b46524fe673c287ba799124e
-
SSDEEP
12288:qpL0oRVMMIqjBah9pZgv8TzNDf9jyFQfDQtgUnx8EOW4:rJEBmH+v8FD1LUnx8EO
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (54) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation RUAAsAEE.exe -
Executes dropped EXE 3 IoCs
pid Process 1308 HcAYIgsM.exe 3992 RUAAsAEE.exe 4436 jCsUcoEg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RUAAsAEE.exe = "C:\\ProgramData\\cOEYwYco\\RUAAsAEE.exe" cc0aba20f7299856b64bb471442d784b.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HcAYIgsM.exe = "C:\\Users\\Admin\\xWgwcQgQ\\HcAYIgsM.exe" HcAYIgsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RUAAsAEE.exe = "C:\\ProgramData\\cOEYwYco\\RUAAsAEE.exe" jCsUcoEg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RUAAsAEE.exe = "C:\\ProgramData\\cOEYwYco\\RUAAsAEE.exe" RUAAsAEE.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HcAYIgsM.exe = "C:\\Users\\Admin\\xWgwcQgQ\\HcAYIgsM.exe" cc0aba20f7299856b64bb471442d784b.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\xWgwcQgQ\HcAYIgsM jCsUcoEg.exe File created C:\Windows\SysWOW64\shell32.dll.exe RUAAsAEE.exe File opened for modification C:\Windows\SysWOW64\sheEnableSave.ppt RUAAsAEE.exe File opened for modification C:\Windows\SysWOW64\sheSelectRestart.mp3 RUAAsAEE.exe File opened for modification C:\Windows\SysWOW64\sheStopInstall.xlsx RUAAsAEE.exe File opened for modification C:\Windows\SysWOW64\sheSubmitUnprotect.jpeg RUAAsAEE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\xWgwcQgQ jCsUcoEg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 3888 reg.exe 2356 reg.exe 2948 reg.exe 924 reg.exe 3152 reg.exe 1488 reg.exe 1676 reg.exe 2988 reg.exe 3524 reg.exe 1916 reg.exe 4424 reg.exe 4452 reg.exe 4768 reg.exe 2988 reg.exe 4536 reg.exe 2992 reg.exe 412 reg.exe 4172 reg.exe 1332 reg.exe 2352 reg.exe 3520 reg.exe 812 reg.exe 2564 reg.exe 4468 reg.exe 3428 reg.exe 2740 reg.exe 3076 reg.exe 1736 reg.exe 4036 reg.exe 2564 reg.exe 1132 reg.exe 3544 reg.exe 1708 reg.exe 1104 reg.exe 1840 reg.exe 4380 reg.exe 4444 reg.exe 2180 reg.exe 4112 reg.exe 1892 reg.exe 1488 reg.exe 2492 reg.exe 4660 reg.exe 4424 reg.exe 5112 reg.exe 3936 reg.exe 3976 reg.exe 4488 reg.exe 812 reg.exe 644 reg.exe 920 reg.exe 1692 reg.exe 3084 reg.exe 3488 reg.exe 4500 reg.exe 3104 reg.exe 1128 reg.exe 3976 reg.exe 2328 reg.exe 4488 reg.exe 396 reg.exe 2264 reg.exe 3164 reg.exe 2200 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3148 cc0aba20f7299856b64bb471442d784b.exe 3148 cc0aba20f7299856b64bb471442d784b.exe 3148 cc0aba20f7299856b64bb471442d784b.exe 3148 cc0aba20f7299856b64bb471442d784b.exe 1216 cc0aba20f7299856b64bb471442d784b.exe 1216 cc0aba20f7299856b64bb471442d784b.exe 1216 cc0aba20f7299856b64bb471442d784b.exe 1216 cc0aba20f7299856b64bb471442d784b.exe 1496 cc0aba20f7299856b64bb471442d784b.exe 1496 cc0aba20f7299856b64bb471442d784b.exe 1496 cc0aba20f7299856b64bb471442d784b.exe 1496 cc0aba20f7299856b64bb471442d784b.exe 4884 cc0aba20f7299856b64bb471442d784b.exe 4884 cc0aba20f7299856b64bb471442d784b.exe 4884 cc0aba20f7299856b64bb471442d784b.exe 4884 cc0aba20f7299856b64bb471442d784b.exe 3428 cc0aba20f7299856b64bb471442d784b.exe 3428 cc0aba20f7299856b64bb471442d784b.exe 3428 cc0aba20f7299856b64bb471442d784b.exe 3428 cc0aba20f7299856b64bb471442d784b.exe 3060 cc0aba20f7299856b64bb471442d784b.exe 3060 cc0aba20f7299856b64bb471442d784b.exe 3060 cc0aba20f7299856b64bb471442d784b.exe 3060 cc0aba20f7299856b64bb471442d784b.exe 3552 cc0aba20f7299856b64bb471442d784b.exe 3552 cc0aba20f7299856b64bb471442d784b.exe 3552 cc0aba20f7299856b64bb471442d784b.exe 3552 cc0aba20f7299856b64bb471442d784b.exe 4488 cc0aba20f7299856b64bb471442d784b.exe 4488 cc0aba20f7299856b64bb471442d784b.exe 4488 cc0aba20f7299856b64bb471442d784b.exe 4488 cc0aba20f7299856b64bb471442d784b.exe 2492 cc0aba20f7299856b64bb471442d784b.exe 2492 cc0aba20f7299856b64bb471442d784b.exe 2492 cc0aba20f7299856b64bb471442d784b.exe 2492 cc0aba20f7299856b64bb471442d784b.exe 3788 cc0aba20f7299856b64bb471442d784b.exe 3788 cc0aba20f7299856b64bb471442d784b.exe 3788 cc0aba20f7299856b64bb471442d784b.exe 3788 cc0aba20f7299856b64bb471442d784b.exe 776 cc0aba20f7299856b64bb471442d784b.exe 776 cc0aba20f7299856b64bb471442d784b.exe 776 cc0aba20f7299856b64bb471442d784b.exe 776 cc0aba20f7299856b64bb471442d784b.exe 2976 cc0aba20f7299856b64bb471442d784b.exe 2976 cc0aba20f7299856b64bb471442d784b.exe 2976 cc0aba20f7299856b64bb471442d784b.exe 2976 cc0aba20f7299856b64bb471442d784b.exe 5016 cc0aba20f7299856b64bb471442d784b.exe 5016 cc0aba20f7299856b64bb471442d784b.exe 5016 cc0aba20f7299856b64bb471442d784b.exe 5016 cc0aba20f7299856b64bb471442d784b.exe 4476 cc0aba20f7299856b64bb471442d784b.exe 4476 cc0aba20f7299856b64bb471442d784b.exe 4476 cc0aba20f7299856b64bb471442d784b.exe 4476 cc0aba20f7299856b64bb471442d784b.exe 4604 cc0aba20f7299856b64bb471442d784b.exe 4604 cc0aba20f7299856b64bb471442d784b.exe 4604 cc0aba20f7299856b64bb471442d784b.exe 4604 cc0aba20f7299856b64bb471442d784b.exe 644 cc0aba20f7299856b64bb471442d784b.exe 644 cc0aba20f7299856b64bb471442d784b.exe 644 cc0aba20f7299856b64bb471442d784b.exe 644 cc0aba20f7299856b64bb471442d784b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3992 RUAAsAEE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe 3992 RUAAsAEE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3148 wrote to memory of 1308 3148 cc0aba20f7299856b64bb471442d784b.exe 90 PID 3148 wrote to memory of 1308 3148 cc0aba20f7299856b64bb471442d784b.exe 90 PID 3148 wrote to memory of 1308 3148 cc0aba20f7299856b64bb471442d784b.exe 90 PID 3148 wrote to memory of 3992 3148 cc0aba20f7299856b64bb471442d784b.exe 91 PID 3148 wrote to memory of 3992 3148 cc0aba20f7299856b64bb471442d784b.exe 91 PID 3148 wrote to memory of 3992 3148 cc0aba20f7299856b64bb471442d784b.exe 91 PID 3148 wrote to memory of 3668 3148 cc0aba20f7299856b64bb471442d784b.exe 95 PID 3148 wrote to memory of 3668 3148 cc0aba20f7299856b64bb471442d784b.exe 95 PID 3148 wrote to memory of 3668 3148 cc0aba20f7299856b64bb471442d784b.exe 95 PID 3668 wrote to memory of 1216 3668 cmd.exe 97 PID 3668 wrote to memory of 1216 3668 cmd.exe 97 PID 3668 wrote to memory of 1216 3668 cmd.exe 97 PID 3148 wrote to memory of 1836 3148 cc0aba20f7299856b64bb471442d784b.exe 98 PID 3148 wrote to memory of 1836 3148 cc0aba20f7299856b64bb471442d784b.exe 98 PID 3148 wrote to memory of 1836 3148 cc0aba20f7299856b64bb471442d784b.exe 98 PID 3148 wrote to memory of 5040 3148 cc0aba20f7299856b64bb471442d784b.exe 99 PID 3148 wrote to memory of 5040 3148 cc0aba20f7299856b64bb471442d784b.exe 99 PID 3148 wrote to memory of 5040 3148 cc0aba20f7299856b64bb471442d784b.exe 99 PID 3148 wrote to memory of 3488 3148 cc0aba20f7299856b64bb471442d784b.exe 101 PID 3148 wrote to memory of 3488 3148 cc0aba20f7299856b64bb471442d784b.exe 101 PID 3148 wrote to memory of 3488 3148 cc0aba20f7299856b64bb471442d784b.exe 101 PID 1216 wrote to memory of 3580 1216 cc0aba20f7299856b64bb471442d784b.exe 104 PID 1216 wrote to memory of 3580 1216 cc0aba20f7299856b64bb471442d784b.exe 104 PID 1216 wrote to memory of 3580 1216 cc0aba20f7299856b64bb471442d784b.exe 104 PID 1216 wrote to memory of 2072 1216 cc0aba20f7299856b64bb471442d784b.exe 106 PID 1216 wrote to memory of 2072 1216 cc0aba20f7299856b64bb471442d784b.exe 106 PID 1216 wrote to memory of 2072 1216 cc0aba20f7299856b64bb471442d784b.exe 106 PID 1216 wrote to memory of 1812 1216 cc0aba20f7299856b64bb471442d784b.exe 160 PID 1216 wrote to memory of 1812 1216 cc0aba20f7299856b64bb471442d784b.exe 160 PID 1216 wrote to memory of 1812 1216 cc0aba20f7299856b64bb471442d784b.exe 160 PID 1216 wrote to memory of 1840 1216 cc0aba20f7299856b64bb471442d784b.exe 162 PID 1216 wrote to memory of 1840 1216 cc0aba20f7299856b64bb471442d784b.exe 162 PID 1216 wrote to memory of 1840 1216 cc0aba20f7299856b64bb471442d784b.exe 162 PID 1216 wrote to memory of 2580 1216 cc0aba20f7299856b64bb471442d784b.exe 109 PID 1216 wrote to memory of 2580 1216 cc0aba20f7299856b64bb471442d784b.exe 109 PID 1216 wrote to memory of 2580 1216 cc0aba20f7299856b64bb471442d784b.exe 109 PID 3580 wrote to memory of 1496 3580 cmd.exe 114 PID 3580 wrote to memory of 1496 3580 cmd.exe 114 PID 3580 wrote to memory of 1496 3580 cmd.exe 114 PID 2580 wrote to memory of 3928 2580 cmd.exe 115 PID 2580 wrote to memory of 3928 2580 cmd.exe 115 PID 2580 wrote to memory of 3928 2580 cmd.exe 115 PID 1496 wrote to memory of 1548 1496 cc0aba20f7299856b64bb471442d784b.exe 116 PID 1496 wrote to memory of 1548 1496 cc0aba20f7299856b64bb471442d784b.exe 116 PID 1496 wrote to memory of 1548 1496 cc0aba20f7299856b64bb471442d784b.exe 116 PID 1548 wrote to memory of 4884 1548 cmd.exe 118 PID 1548 wrote to memory of 4884 1548 cmd.exe 118 PID 1548 wrote to memory of 4884 1548 cmd.exe 118 PID 1496 wrote to memory of 2572 1496 cc0aba20f7299856b64bb471442d784b.exe 119 PID 1496 wrote to memory of 2572 1496 cc0aba20f7299856b64bb471442d784b.exe 119 PID 1496 wrote to memory of 2572 1496 cc0aba20f7299856b64bb471442d784b.exe 119 PID 1496 wrote to memory of 2740 1496 cc0aba20f7299856b64bb471442d784b.exe 120 PID 1496 wrote to memory of 2740 1496 cc0aba20f7299856b64bb471442d784b.exe 120 PID 1496 wrote to memory of 2740 1496 cc0aba20f7299856b64bb471442d784b.exe 120 PID 1496 wrote to memory of 868 1496 cc0aba20f7299856b64bb471442d784b.exe 121 PID 1496 wrote to memory of 868 1496 cc0aba20f7299856b64bb471442d784b.exe 121 PID 1496 wrote to memory of 868 1496 cc0aba20f7299856b64bb471442d784b.exe 121 PID 1496 wrote to memory of 3504 1496 cc0aba20f7299856b64bb471442d784b.exe 122 PID 1496 wrote to memory of 3504 1496 cc0aba20f7299856b64bb471442d784b.exe 122 PID 1496 wrote to memory of 3504 1496 cc0aba20f7299856b64bb471442d784b.exe 122 PID 4884 wrote to memory of 4844 4884 cc0aba20f7299856b64bb471442d784b.exe 127 PID 4884 wrote to memory of 4844 4884 cc0aba20f7299856b64bb471442d784b.exe 127 PID 4884 wrote to memory of 4844 4884 cc0aba20f7299856b64bb471442d784b.exe 127 PID 3504 wrote to memory of 1864 3504 cmd.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exe"C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\xWgwcQgQ\HcAYIgsM.exe"C:\Users\Admin\xWgwcQgQ\HcAYIgsM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1308
-
-
C:\ProgramData\cOEYwYco\RUAAsAEE.exe"C:\ProgramData\cOEYwYco\RUAAsAEE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"2⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"4⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"6⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"8⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"10⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"12⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"14⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"16⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"18⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"20⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b21⤵
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"22⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"24⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b25⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"26⤵PID:452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"28⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"30⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b31⤵
- Suspicious behavior: EnumeratesProcesses
PID:644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"32⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b33⤵PID:2184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"34⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b35⤵PID:2872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"36⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b37⤵PID:744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"38⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b39⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"40⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b41⤵PID:840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"42⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b43⤵PID:2688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"44⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b45⤵PID:1016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"46⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b47⤵PID:2720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"48⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b49⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"50⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b51⤵PID:440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"52⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b53⤵PID:2480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"54⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b55⤵PID:3872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"56⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b57⤵PID:4652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"58⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b59⤵PID:4884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"60⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b61⤵PID:1696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"62⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b63⤵PID:1140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"64⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b65⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"66⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b67⤵PID:4088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"68⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b69⤵PID:2976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"70⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b71⤵PID:548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"72⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b73⤵PID:2344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"74⤵PID:3084
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b75⤵PID:3660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"76⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b77⤵PID:3648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"78⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b79⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"80⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b81⤵PID:4888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"82⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b83⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"84⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b85⤵PID:5068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"86⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b87⤵PID:4652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"88⤵PID:4516
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b89⤵PID:3796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"90⤵PID:3520
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b91⤵PID:2976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"92⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b93⤵PID:1256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"94⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b95⤵PID:5016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"96⤵PID:3836
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b97⤵PID:3800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"98⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b99⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"100⤵PID:1912
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b101⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"102⤵PID:3552
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b103⤵PID:4368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"104⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b105⤵PID:2800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"106⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b107⤵PID:5096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"108⤵PID:392
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:3496
-
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b109⤵PID:2420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"110⤵PID:3088
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b111⤵PID:768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"112⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b113⤵PID:4384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"114⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b115⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"116⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b117⤵PID:3624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"118⤵PID:2016
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b119⤵PID:624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"120⤵PID:4432
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b.exeC:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b121⤵PID:2716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cc0aba20f7299856b64bb471442d784b"122⤵PID:3552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-