Analysis
-
max time kernel
171s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe
Resource
win10v2004-20220812-en
General
-
Target
b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe
-
Size
439KB
-
MD5
7140d81c5f444abc46e4ea47e09f06a0
-
SHA1
414554f75a407d838686f4c27e1ef886859d37e1
-
SHA256
b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5
-
SHA512
94da8567ba8398ca058376916d15deb79b04559278ca13d9154992272d076a8e90f451b07a1a3ffc90ce023999cf6b7b51edf3aa6dcd84b9aee0663cd6666db0
-
SSDEEP
6144:17vTpBt2avt4KJ8g6vNeNCr5RCpXml0Av4pCmg5ym0u4DIO+0vYOPS1HO2t:VTF2aiKMv54MSAmLsWPS1
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4496 wmYoowUI.exe 1788 sAQMwYss.exe 3156 HIsUEIME.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sAQMwYss.exe = "C:\\ProgramData\\HuwkIAUE\\sAQMwYss.exe" b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmYoowUI.exe = "C:\\Users\\Admin\\HqMQIscg\\wmYoowUI.exe" wmYoowUI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sAQMwYss.exe = "C:\\ProgramData\\HuwkIAUE\\sAQMwYss.exe" sAQMwYss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sAQMwYss.exe = "C:\\ProgramData\\HuwkIAUE\\sAQMwYss.exe" HIsUEIME.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmYoowUI.exe = "C:\\Users\\Admin\\HqMQIscg\\wmYoowUI.exe" b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheSuspendPing.mpg wmYoowUI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\HqMQIscg HIsUEIME.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\HqMQIscg\wmYoowUI HIsUEIME.exe File created C:\Windows\SysWOW64\shell32.dll.exe wmYoowUI.exe File opened for modification C:\Windows\SysWOW64\sheDismountWatch.wma wmYoowUI.exe File opened for modification C:\Windows\SysWOW64\shePushPing.zip wmYoowUI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 5308 reg.exe 5248 reg.exe 5424 reg.exe 1444 reg.exe 1808 reg.exe 6004 reg.exe 2556 reg.exe 5712 reg.exe 5924 reg.exe 5524 reg.exe 1432 reg.exe 1404 reg.exe 3620 reg.exe 3416 reg.exe 2616 reg.exe 5380 reg.exe 3320 reg.exe 400 reg.exe 3772 reg.exe 3756 reg.exe 3952 reg.exe 5148 reg.exe 3724 reg.exe 5288 reg.exe 3100 reg.exe 5300 reg.exe 5304 reg.exe 3956 reg.exe 1664 reg.exe 4060 reg.exe 3820 reg.exe 5948 reg.exe 2052 reg.exe 876 reg.exe 4320 reg.exe 6072 reg.exe 3480 reg.exe 2252 reg.exe 3480 reg.exe 5824 reg.exe 5964 reg.exe 1396 reg.exe 5924 reg.exe 5848 reg.exe 3692 reg.exe 5336 reg.exe 2544 reg.exe 1180 reg.exe 4716 reg.exe 5272 reg.exe 2136 reg.exe 3540 reg.exe 1312 reg.exe 840 reg.exe 5280 reg.exe 548 reg.exe 2076 reg.exe 4144 reg.exe 3108 reg.exe 3232 reg.exe 1744 reg.exe 4368 reg.exe 3916 reg.exe 2360 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1944 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1944 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1944 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1944 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1192 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1192 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1192 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1192 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4956 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4956 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4956 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4956 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 5024 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 5024 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 5024 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 5024 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 3756 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 3756 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 3756 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 3756 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1604 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1604 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1604 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 1604 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4916 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4916 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4916 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4916 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 772 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 772 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 772 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 772 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 2372 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 2372 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 2372 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 2372 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4076 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4076 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4076 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4076 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 3756 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 3756 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 3756 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 3756 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4952 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4952 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4952 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 4952 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1280 wrote to memory of 4496 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 81 PID 1280 wrote to memory of 4496 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 81 PID 1280 wrote to memory of 4496 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 81 PID 1280 wrote to memory of 1788 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 82 PID 1280 wrote to memory of 1788 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 82 PID 1280 wrote to memory of 1788 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 82 PID 1280 wrote to memory of 2124 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 84 PID 1280 wrote to memory of 2124 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 84 PID 1280 wrote to memory of 2124 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 84 PID 1280 wrote to memory of 648 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 85 PID 1280 wrote to memory of 648 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 85 PID 1280 wrote to memory of 648 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 85 PID 1280 wrote to memory of 1180 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 86 PID 1280 wrote to memory of 1180 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 86 PID 1280 wrote to memory of 1180 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 86 PID 1280 wrote to memory of 2980 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 87 PID 1280 wrote to memory of 2980 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 87 PID 1280 wrote to memory of 2980 1280 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 87 PID 2124 wrote to memory of 3692 2124 cmd.exe 92 PID 2124 wrote to memory of 3692 2124 cmd.exe 92 PID 2124 wrote to memory of 3692 2124 cmd.exe 92 PID 3692 wrote to memory of 3940 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 93 PID 3692 wrote to memory of 3940 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 93 PID 3692 wrote to memory of 3940 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 93 PID 3692 wrote to memory of 988 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 95 PID 3692 wrote to memory of 988 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 95 PID 3692 wrote to memory of 988 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 95 PID 3940 wrote to memory of 1004 3940 cmd.exe 96 PID 3940 wrote to memory of 1004 3940 cmd.exe 96 PID 3940 wrote to memory of 1004 3940 cmd.exe 96 PID 3692 wrote to memory of 1948 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 97 PID 3692 wrote to memory of 1948 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 97 PID 3692 wrote to memory of 1948 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 97 PID 3692 wrote to memory of 4308 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 100 PID 3692 wrote to memory of 4308 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 100 PID 3692 wrote to memory of 4308 3692 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 100 PID 1004 wrote to memory of 3100 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 102 PID 1004 wrote to memory of 3100 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 102 PID 1004 wrote to memory of 3100 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 102 PID 3100 wrote to memory of 2176 3100 cmd.exe 104 PID 3100 wrote to memory of 2176 3100 cmd.exe 104 PID 3100 wrote to memory of 2176 3100 cmd.exe 104 PID 1004 wrote to memory of 3108 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 105 PID 1004 wrote to memory of 3108 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 105 PID 1004 wrote to memory of 3108 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 105 PID 1004 wrote to memory of 3232 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 108 PID 1004 wrote to memory of 3232 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 108 PID 1004 wrote to memory of 3232 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 108 PID 1004 wrote to memory of 4972 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 107 PID 1004 wrote to memory of 4972 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 107 PID 1004 wrote to memory of 4972 1004 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 107 PID 2176 wrote to memory of 3876 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 111 PID 2176 wrote to memory of 3876 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 111 PID 2176 wrote to memory of 3876 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 111 PID 3876 wrote to memory of 1944 3876 cmd.exe 113 PID 3876 wrote to memory of 1944 3876 cmd.exe 113 PID 3876 wrote to memory of 1944 3876 cmd.exe 113 PID 2176 wrote to memory of 1404 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 114 PID 2176 wrote to memory of 1404 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 114 PID 2176 wrote to memory of 1404 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 114 PID 2176 wrote to memory of 3308 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 115 PID 2176 wrote to memory of 3308 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 115 PID 2176 wrote to memory of 3308 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 115 PID 2176 wrote to memory of 4420 2176 b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe"C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\HqMQIscg\wmYoowUI.exe"C:\Users\Admin\HqMQIscg\wmYoowUI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4496
-
-
C:\ProgramData\HuwkIAUE\sAQMwYss.exe"C:\ProgramData\HuwkIAUE\sAQMwYss.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"2⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce53⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"4⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce55⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"6⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce57⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"8⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"10⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce511⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"12⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce513⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"14⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce515⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"16⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce517⤵
- Suspicious behavior: EnumeratesProcesses
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"18⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce519⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"20⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce521⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"22⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce523⤵
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"24⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce525⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"26⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce527⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"28⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce529⤵
- Suspicious behavior: EnumeratesProcesses
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"30⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce531⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"32⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce533⤵PID:1700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"34⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce535⤵PID:2140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"36⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce537⤵PID:3224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"38⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce539⤵PID:3756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"40⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce541⤵PID:3724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"42⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce543⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"44⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce545⤵PID:2036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"46⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce547⤵PID:388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"48⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce549⤵PID:480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"50⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce551⤵PID:772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"52⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce553⤵PID:1260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"54⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce555⤵PID:3692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"56⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce557⤵PID:3744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"58⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce559⤵PID:4372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"60⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce561⤵PID:2356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"62⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce563⤵PID:5216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"64⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce565⤵PID:5444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"66⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce567⤵PID:5696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"68⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce569⤵PID:5156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"70⤵PID:5332
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce571⤵PID:5548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"72⤵PID:5748
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce573⤵PID:5096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"74⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce575⤵PID:4432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"76⤵PID:5752
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce577⤵PID:5360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"78⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce579⤵PID:2364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"80⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce581⤵PID:2928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"82⤵PID:5316
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce583⤵PID:5916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"84⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce585⤵PID:3948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"86⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce587⤵PID:5144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"88⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce589⤵PID:4460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"90⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce591⤵PID:3940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"92⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce593⤵PID:1260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"94⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce595⤵PID:5596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"96⤵PID:5516
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce597⤵PID:5020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"98⤵PID:5836
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce599⤵PID:6128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"100⤵PID:5308
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5101⤵PID:1324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"102⤵PID:5572
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5103⤵PID:5384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"104⤵PID:6140
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5105⤵PID:3344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"106⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5107⤵PID:2044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"108⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5109⤵PID:5312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"110⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5111⤵PID:5708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"112⤵PID:5984
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5113⤵PID:1636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"114⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5115⤵PID:5608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"116⤵PID:6096
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5117⤵PID:1252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"118⤵PID:5968
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5119⤵PID:6036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"120⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5.exeC:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5121⤵PID:1648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b1d49c6baee7cf34972d0315a426034016e24a9e976d52df0427618746becce5"122⤵PID:5780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-