Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe
Resource
win10v2004-20220812-en
General
-
Target
872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe
-
Size
512KB
-
MD5
6d7c5c13fecadc33c9291e0970a3c560
-
SHA1
8d62c7582edd61327c891b28c63722a3c5bf2004
-
SHA256
872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836
-
SHA512
45c82a7f836bb3030be2989879fbc484e10bd377f59e48cca4d2f7a712f98930ad818ae00bc80c3ceee4cbb5352a691d12e092a568d62d80405a932c804e6bab
-
SSDEEP
12288:tie8FYDUmK2zYPcLBLlZl5srEpOlTMTTOAEqYddeGvV4LU:vGYDZ3LVlZQZyTOAEqYDeO4o
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4844 CQwwooMg.exe 4888 QmAAwksQ.exe 1660 GuwQAssQ.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation CQwwooMg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CQwwooMg.exe = "C:\\Users\\Admin\\DyIkUEcE\\CQwwooMg.exe" 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QmAAwksQ.exe = "C:\\ProgramData\\PeokoccA\\QmAAwksQ.exe" 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CQwwooMg.exe = "C:\\Users\\Admin\\DyIkUEcE\\CQwwooMg.exe" CQwwooMg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QmAAwksQ.exe = "C:\\ProgramData\\PeokoccA\\QmAAwksQ.exe" QmAAwksQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QmAAwksQ.exe = "C:\\ProgramData\\PeokoccA\\QmAAwksQ.exe" GuwQAssQ.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\DyIkUEcE GuwQAssQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\DyIkUEcE\CQwwooMg GuwQAssQ.exe File created C:\Windows\SysWOW64\shell32.dll.exe CQwwooMg.exe File opened for modification C:\Windows\SysWOW64\sheTestClose.wma CQwwooMg.exe File opened for modification C:\Windows\SysWOW64\sheTraceLimit.docx CQwwooMg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1776 reg.exe 1496 reg.exe 1988 reg.exe 4788 reg.exe 3892 reg.exe 4896 reg.exe 4376 reg.exe 3372 reg.exe 2456 reg.exe 4816 reg.exe 5000 reg.exe 2232 reg.exe 4400 reg.exe 3096 reg.exe 5104 reg.exe 4408 reg.exe 684 reg.exe 1576 reg.exe 4076 reg.exe 4020 reg.exe 1296 reg.exe 3260 reg.exe 5008 reg.exe 3576 reg.exe 2376 reg.exe 2900 reg.exe 996 reg.exe 1100 reg.exe 3116 reg.exe 4408 reg.exe 1008 reg.exe 1508 reg.exe 4424 reg.exe 2368 reg.exe 4988 reg.exe 2140 reg.exe 3792 reg.exe 4292 reg.exe 1316 reg.exe 4208 reg.exe 3376 reg.exe 768 reg.exe 3344 reg.exe 2680 reg.exe 3932 reg.exe 2408 reg.exe 3148 reg.exe 1032 reg.exe 2876 reg.exe 2124 reg.exe 1192 reg.exe 1268 reg.exe 4688 reg.exe 1516 reg.exe 2736 reg.exe 1524 reg.exe 3124 reg.exe 2020 reg.exe 3124 reg.exe 2044 reg.exe 3140 reg.exe 4652 reg.exe 1592 reg.exe 1636 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4544 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4544 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4544 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4544 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 2672 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 2672 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 2672 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 2672 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 928 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 928 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 928 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 928 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 2116 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 2116 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 2116 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 2116 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 1100 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 1100 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 1100 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 1100 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4568 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4568 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4568 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4568 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 3092 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 3092 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 3092 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 3092 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4952 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4952 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4952 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4952 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 460 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 460 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 460 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 460 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4992 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4992 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4992 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 4992 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 204 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 204 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 204 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 204 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 3820 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 3820 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 3820 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 3820 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 3180 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 3180 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 3180 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 3180 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4844 CQwwooMg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe 4844 CQwwooMg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 4844 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 82 PID 744 wrote to memory of 4844 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 82 PID 744 wrote to memory of 4844 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 82 PID 744 wrote to memory of 4888 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 83 PID 744 wrote to memory of 4888 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 83 PID 744 wrote to memory of 4888 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 83 PID 744 wrote to memory of 5056 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 85 PID 744 wrote to memory of 5056 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 85 PID 744 wrote to memory of 5056 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 85 PID 5056 wrote to memory of 1504 5056 cmd.exe 87 PID 5056 wrote to memory of 1504 5056 cmd.exe 87 PID 5056 wrote to memory of 1504 5056 cmd.exe 87 PID 744 wrote to memory of 1500 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 88 PID 744 wrote to memory of 1500 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 88 PID 744 wrote to memory of 1500 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 88 PID 744 wrote to memory of 4376 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 89 PID 744 wrote to memory of 4376 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 89 PID 744 wrote to memory of 4376 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 89 PID 744 wrote to memory of 2344 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 91 PID 744 wrote to memory of 2344 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 91 PID 744 wrote to memory of 2344 744 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 91 PID 1504 wrote to memory of 1376 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 94 PID 1504 wrote to memory of 1376 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 94 PID 1504 wrote to memory of 1376 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 94 PID 1504 wrote to memory of 1988 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 96 PID 1504 wrote to memory of 1988 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 96 PID 1504 wrote to memory of 1988 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 96 PID 1504 wrote to memory of 1028 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 98 PID 1504 wrote to memory of 1028 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 98 PID 1504 wrote to memory of 1028 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 98 PID 1504 wrote to memory of 2408 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 100 PID 1504 wrote to memory of 2408 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 100 PID 1504 wrote to memory of 2408 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 100 PID 1504 wrote to memory of 2144 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 102 PID 1504 wrote to memory of 2144 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 102 PID 1504 wrote to memory of 2144 1504 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 102 PID 1376 wrote to memory of 1268 1376 cmd.exe 104 PID 1376 wrote to memory of 1268 1376 cmd.exe 104 PID 1376 wrote to memory of 1268 1376 cmd.exe 104 PID 2144 wrote to memory of 2544 2144 cmd.exe 105 PID 2144 wrote to memory of 2544 2144 cmd.exe 105 PID 2144 wrote to memory of 2544 2144 cmd.exe 105 PID 1268 wrote to memory of 2884 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 106 PID 1268 wrote to memory of 2884 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 106 PID 1268 wrote to memory of 2884 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 106 PID 2884 wrote to memory of 4544 2884 cmd.exe 108 PID 2884 wrote to memory of 4544 2884 cmd.exe 108 PID 2884 wrote to memory of 4544 2884 cmd.exe 108 PID 1268 wrote to memory of 2212 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 109 PID 1268 wrote to memory of 2212 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 109 PID 1268 wrote to memory of 2212 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 109 PID 1268 wrote to memory of 3832 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 110 PID 1268 wrote to memory of 3832 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 110 PID 1268 wrote to memory of 3832 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 110 PID 1268 wrote to memory of 4108 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 111 PID 1268 wrote to memory of 4108 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 111 PID 1268 wrote to memory of 4108 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 111 PID 1268 wrote to memory of 1540 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 114 PID 1268 wrote to memory of 1540 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 114 PID 1268 wrote to memory of 1540 1268 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 114 PID 4544 wrote to memory of 2900 4544 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 117 PID 4544 wrote to memory of 2900 4544 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 117 PID 4544 wrote to memory of 2900 4544 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 117 PID 4544 wrote to memory of 4688 4544 872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe"C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\DyIkUEcE\CQwwooMg.exe"C:\Users\Admin\DyIkUEcE\CQwwooMg.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4844
-
-
C:\ProgramData\PeokoccA\QmAAwksQ.exe"C:\ProgramData\PeokoccA\QmAAwksQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"2⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d98363⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"4⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d98365⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"6⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d98367⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"8⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d98369⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"10⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983611⤵
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"12⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983613⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"14⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983615⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"16⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983617⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"18⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983619⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"20⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983621⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"22⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983623⤵
- Suspicious behavior: EnumeratesProcesses
PID:460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"24⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983625⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"26⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983627⤵
- Suspicious behavior: EnumeratesProcesses
PID:204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"28⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983629⤵
- Suspicious behavior: EnumeratesProcesses
PID:3820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"30⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983631⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"32⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983633⤵PID:3404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"34⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983635⤵PID:4920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"36⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983637⤵PID:2200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"38⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983639⤵PID:3468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"40⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983641⤵PID:5084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"42⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983643⤵PID:1524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"44⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983645⤵PID:4304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"46⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983647⤵PID:2276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"48⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983649⤵PID:3124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"50⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983651⤵PID:1148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"52⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983653⤵PID:3328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"54⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983655⤵PID:1588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"56⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983657⤵PID:1008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"58⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983659⤵PID:4872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"60⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983661⤵PID:4968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"62⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983663⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"64⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983665⤵PID:2200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"66⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983667⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"68⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983669⤵PID:3004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"70⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983671⤵PID:3436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"72⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983673⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"74⤵PID:2168
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983675⤵PID:3828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"76⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983677⤵PID:3232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"78⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983679⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"80⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983681⤵PID:1984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"82⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983683⤵PID:1592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"84⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983685⤵PID:3768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"86⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983687⤵PID:4968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"88⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983689⤵PID:1192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"90⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983691⤵PID:480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"92⤵PID:1708
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983693⤵PID:3936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"94⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983695⤵PID:1836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"96⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983697⤵PID:1356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"98⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d983699⤵PID:2600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"100⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836101⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"102⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836103⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"104⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836105⤵PID:2848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"106⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836107⤵PID:760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"108⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836109⤵PID:2560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"110⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836111⤵PID:2148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"112⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836113⤵PID:1264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"114⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836115⤵PID:2280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"116⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836117⤵PID:5096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"118⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836119⤵PID:432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"120⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836.exeC:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836121⤵PID:760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836"122⤵PID:4264
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-