Analysis
-
max time kernel
161s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe
Resource
win10v2004-20220812-en
General
-
Target
7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe
-
Size
1.1MB
-
MD5
6c45ba0dcd794107468431afe2d66420
-
SHA1
8f980b4e7fc459762a2d6797b6ccaa52ccb01e72
-
SHA256
7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043
-
SHA512
307486863bcb3f090a95a5b9f2b5e9363401340f3ce636388a07d13c0c89dbb71f6760366bc6cc2d915ccc4f06a28a53efaa5dcca33077f76388ffe3700dced3
-
SSDEEP
24576:U6W58thO1sj8IqMvgyFnT0Cjt/FbZxsMCzb04EDuVvuNj:nthl7qM1hjt/VLW3lEDuVvuNj
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\hiwUMUww\\LuUUowcA.exe," 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\hiwUMUww\\LuUUowcA.exe," 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 1080 IYwkgwwo.exe 876 LuUUowcA.exe 1340 zQIcIMQE.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\UnblockUninstall.png.exe LuUUowcA.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\Geo\Nation LuUUowcA.exe -
Deletes itself 1 IoCs
pid Process 2140 cmd.exe -
Loads dropped DLL 22 IoCs
pid Process 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LuUUowcA.exe = "C:\\ProgramData\\hiwUMUww\\LuUUowcA.exe" LuUUowcA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LuUUowcA.exe = "C:\\ProgramData\\hiwUMUww\\LuUUowcA.exe" zQIcIMQE.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\IYwkgwwo.exe = "C:\\Users\\Admin\\icYkQwgA\\IYwkgwwo.exe" 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LuUUowcA.exe = "C:\\ProgramData\\hiwUMUww\\LuUUowcA.exe" 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\IYwkgwwo.exe = "C:\\Users\\Admin\\icYkQwgA\\IYwkgwwo.exe" IYwkgwwo.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\icYkQwgA zQIcIMQE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\icYkQwgA\IYwkgwwo zQIcIMQE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 852 reg.exe 1844 reg.exe 2304 reg.exe 2312 reg.exe 2852 reg.exe 2232 reg.exe 2668 reg.exe 1956 reg.exe 2576 reg.exe 2392 reg.exe 1704 reg.exe 2652 reg.exe 2268 reg.exe 2028 reg.exe 2264 reg.exe 3056 reg.exe 2028 reg.exe 2628 reg.exe 2852 reg.exe 1128 reg.exe 2472 reg.exe 972 reg.exe 1368 reg.exe 1084 reg.exe 2272 reg.exe 972 reg.exe 1980 reg.exe 2696 reg.exe 2700 reg.exe 2712 reg.exe 2484 reg.exe 2096 reg.exe 2792 reg.exe 808 reg.exe 2604 reg.exe 2144 reg.exe 1124 reg.exe 1728 reg.exe 1956 reg.exe 1728 reg.exe 2344 reg.exe 3024 reg.exe 2692 reg.exe 1392 reg.exe 1296 reg.exe 1120 reg.exe 3048 reg.exe 2460 reg.exe 844 reg.exe 2848 reg.exe 1344 reg.exe 528 reg.exe 2384 reg.exe 2924 reg.exe 3012 reg.exe 2028 reg.exe 2748 reg.exe 1104 reg.exe 2464 reg.exe 2240 reg.exe 2656 reg.exe 992 reg.exe 2840 reg.exe 1396 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 840 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 840 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1488 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1488 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1596 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1596 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1608 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1608 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 548 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 548 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1192 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1192 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1124 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1124 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1668 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1668 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1940 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1940 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2216 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2216 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2356 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2356 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2544 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2544 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2752 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2752 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2988 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2988 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2268 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2268 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2444 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2444 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2028 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2028 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 812 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 812 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2620 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2620 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2684 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2684 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2900 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2900 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2704 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2704 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1780 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1780 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2372 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2372 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1568 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1568 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1716 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1716 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1192 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1192 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1356 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 1356 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2504 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 2504 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe 876 LuUUowcA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1080 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 27 PID 1476 wrote to memory of 1080 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 27 PID 1476 wrote to memory of 1080 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 27 PID 1476 wrote to memory of 1080 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 27 PID 1476 wrote to memory of 876 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 28 PID 1476 wrote to memory of 876 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 28 PID 1476 wrote to memory of 876 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 28 PID 1476 wrote to memory of 876 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 28 PID 1476 wrote to memory of 1932 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 30 PID 1476 wrote to memory of 1932 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 30 PID 1476 wrote to memory of 1932 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 30 PID 1476 wrote to memory of 1932 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 30 PID 1932 wrote to memory of 720 1932 cmd.exe 33 PID 1932 wrote to memory of 720 1932 cmd.exe 33 PID 1932 wrote to memory of 720 1932 cmd.exe 33 PID 1932 wrote to memory of 720 1932 cmd.exe 33 PID 720 wrote to memory of 1084 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 34 PID 720 wrote to memory of 1084 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 34 PID 720 wrote to memory of 1084 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 34 PID 720 wrote to memory of 1084 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 34 PID 1084 wrote to memory of 2020 1084 cmd.exe 36 PID 1084 wrote to memory of 2020 1084 cmd.exe 36 PID 1084 wrote to memory of 2020 1084 cmd.exe 36 PID 1084 wrote to memory of 2020 1084 cmd.exe 36 PID 2020 wrote to memory of 920 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 38 PID 2020 wrote to memory of 920 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 38 PID 2020 wrote to memory of 920 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 38 PID 2020 wrote to memory of 920 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 38 PID 920 wrote to memory of 840 920 cmd.exe 40 PID 920 wrote to memory of 840 920 cmd.exe 40 PID 920 wrote to memory of 840 920 cmd.exe 40 PID 920 wrote to memory of 840 920 cmd.exe 40 PID 720 wrote to memory of 556 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 37 PID 720 wrote to memory of 556 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 37 PID 720 wrote to memory of 556 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 37 PID 720 wrote to memory of 556 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 37 PID 1476 wrote to memory of 1252 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 32 PID 1476 wrote to memory of 1252 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 32 PID 1476 wrote to memory of 1252 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 32 PID 1476 wrote to memory of 1252 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 32 PID 1476 wrote to memory of 1728 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 43 PID 1476 wrote to memory of 1728 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 43 PID 1476 wrote to memory of 1728 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 43 PID 1476 wrote to memory of 1728 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 43 PID 720 wrote to memory of 1884 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 44 PID 720 wrote to memory of 1884 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 44 PID 720 wrote to memory of 1884 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 44 PID 720 wrote to memory of 1884 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 44 PID 720 wrote to memory of 1192 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 45 PID 720 wrote to memory of 1192 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 45 PID 720 wrote to memory of 1192 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 45 PID 720 wrote to memory of 1192 720 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 45 PID 1476 wrote to memory of 1612 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 47 PID 1476 wrote to memory of 1612 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 47 PID 1476 wrote to memory of 1612 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 47 PID 1476 wrote to memory of 1612 1476 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 47 PID 2020 wrote to memory of 1844 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 51 PID 2020 wrote to memory of 1844 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 51 PID 2020 wrote to memory of 1844 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 51 PID 2020 wrote to memory of 1844 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 51 PID 2020 wrote to memory of 1644 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 52 PID 2020 wrote to memory of 1644 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 52 PID 2020 wrote to memory of 1644 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 52 PID 2020 wrote to memory of 1644 2020 7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe"C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\icYkQwgA\IYwkgwwo.exe"C:\Users\Admin\icYkQwgA\IYwkgwwo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1080
-
-
C:\ProgramData\hiwUMUww\LuUUowcA.exe"C:\ProgramData\hiwUMUww\LuUUowcA.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:876
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"2⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc00433⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"4⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc00435⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"6⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc00437⤵
- Suspicious behavior: EnumeratesProcesses
PID:840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"8⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc00439⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"10⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004311⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"12⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004313⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"14⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004315⤵
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"16⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004317⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"18⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004319⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"20⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004321⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"22⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004323⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"24⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004325⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"26⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004327⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"28⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004329⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"30⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004331⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"32⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004333⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"34⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004335⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"36⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004337⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"38⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004339⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"40⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004341⤵
- Suspicious behavior: EnumeratesProcesses
PID:812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"42⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004343⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"44⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004345⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"46⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004347⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"48⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004349⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"50⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004351⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"52⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004353⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"54⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004355⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"56⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004357⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"58⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004359⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"60⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004361⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"62⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004363⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"64⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004365⤵PID:2756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"66⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004367⤵PID:2996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"68⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004369⤵PID:2276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"70⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004371⤵PID:2320
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"72⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004373⤵PID:2000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"74⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004375⤵PID:1464
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"76⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004377⤵PID:2556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"78⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004379⤵PID:2440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"80⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004381⤵PID:1628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"82⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004383⤵PID:2880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"84⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004385⤵PID:2452
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"86⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004387⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"88⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004389⤵PID:2404
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"90⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004391⤵PID:1188
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"92⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004393⤵PID:2760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"94⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004395⤵PID:2536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"96⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004397⤵PID:1104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"98⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc004399⤵PID:2704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"100⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043101⤵PID:2392
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"102⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043103⤵PID:2076
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"104⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043105⤵PID:1604
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"106⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043107⤵PID:528
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"108⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043109⤵PID:2120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"110⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043111⤵PID:2572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"112⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043113⤵PID:2860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"114⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043115⤵PID:2964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"116⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043117⤵PID:2744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"118⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043119⤵PID:2892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"120⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043.exeC:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043121⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043"122⤵PID:1128
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-