Analysis
-
max time kernel
169s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe
Resource
win10v2004-20220812-en
General
-
Target
70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe
-
Size
441KB
-
MD5
54cd9482e65b9e44430288d25e364340
-
SHA1
c8952d623879821ac0da92a53b8275e94b6005f2
-
SHA256
70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d
-
SHA512
2f12678c58f492023a9d4ed7ef3fb518ccb578510bef85e609940c9395d75f1107774346d6b24e4aca9dbab50f240ce87117bb194424758a0190f13a285d71b8
-
SSDEEP
6144:gN9/o4ROzBTRh0PyDvo648g35jaA7/0wOyfXRetExQwiTrKvbsZlQT/Hbd7TOAei:c30JRSotGsA71/AExQNrIv1vg6v0o
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 62 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 3404 eQUEYgkQ.exe 5080 gmwcQUQE.exe 5044 RYMEoocU.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation eQUEYgkQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gmwcQUQE.exe = "C:\\ProgramData\\ykUokcMA\\gmwcQUQE.exe" gmwcQUQE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gmwcQUQE.exe = "C:\\ProgramData\\ykUokcMA\\gmwcQUQE.exe" RYMEoocU.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OWcEgAUk.exe = "C:\\Users\\Admin\\fksIMMsw\\OWcEgAUk.exe" 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BKkkgMUY.exe = "C:\\ProgramData\\diIsEgMY\\BKkkgMUY.exe" 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eQUEYgkQ.exe = "C:\\Users\\Admin\\zmAcEYcU\\eQUEYgkQ.exe" 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eQUEYgkQ.exe = "C:\\Users\\Admin\\zmAcEYcU\\eQUEYgkQ.exe" eQUEYgkQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gmwcQUQE.exe = "C:\\ProgramData\\ykUokcMA\\gmwcQUQE.exe" 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\zmAcEYcU RYMEoocU.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\zmAcEYcU\eQUEYgkQ RYMEoocU.exe File created C:\Windows\SysWOW64\shell32.dll.exe eQUEYgkQ.exe File opened for modification C:\Windows\SysWOW64\sheUnregisterRequest.mpg eQUEYgkQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4360 4696 WerFault.exe 344 2928 2824 WerFault.exe 347 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1072 reg.exe 1212 reg.exe 4308 reg.exe 2252 reg.exe 2888 reg.exe 3584 reg.exe 4176 reg.exe 2408 reg.exe 3776 reg.exe 2492 reg.exe 2128 reg.exe 3652 reg.exe 4864 reg.exe 4756 reg.exe 2396 reg.exe 5008 reg.exe 1248 reg.exe 3688 reg.exe 2224 reg.exe 4748 reg.exe 4536 reg.exe 4000 reg.exe 4660 reg.exe 2028 reg.exe 4380 reg.exe 3864 reg.exe 3892 reg.exe 3016 reg.exe 2436 reg.exe 2812 reg.exe 4536 reg.exe 3632 reg.exe 8 reg.exe 3584 reg.exe 4340 reg.exe 4568 reg.exe 4104 reg.exe 2068 reg.exe 4228 reg.exe 4572 reg.exe 3100 reg.exe 3800 reg.exe 1452 reg.exe 4396 reg.exe 2320 reg.exe 1688 reg.exe 1304 reg.exe 3588 reg.exe 4196 reg.exe 3472 reg.exe 1460 reg.exe 3688 reg.exe 3036 reg.exe 5112 reg.exe 4032 reg.exe 4764 reg.exe 1136 reg.exe 4304 reg.exe 4176 reg.exe 3500 reg.exe 2380 reg.exe 2384 reg.exe 1916 reg.exe 4060 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3040 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3040 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3040 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3040 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3780 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3780 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3780 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3780 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1708 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1708 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1708 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1708 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3756 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3756 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3756 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3756 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1336 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1336 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1336 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1336 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 2508 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 2508 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 2508 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 2508 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3088 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3088 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3088 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3088 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1588 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1588 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1588 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1588 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1516 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1516 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1516 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1516 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1296 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1296 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1296 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 1296 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3944 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3944 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3944 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3944 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 4624 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 4624 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 4624 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 4624 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3756 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3756 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3756 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 3756 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 3404 eQUEYgkQ.exe 3404 eQUEYgkQ.exe 3404 eQUEYgkQ.exe 3404 eQUEYgkQ.exe 3404 eQUEYgkQ.exe 3404 eQUEYgkQ.exe 3404 eQUEYgkQ.exe 3404 eQUEYgkQ.exe 3404 eQUEYgkQ.exe 3404 eQUEYgkQ.exe 3404 eQUEYgkQ.exe 3404 eQUEYgkQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 3404 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 80 PID 3460 wrote to memory of 3404 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 80 PID 3460 wrote to memory of 3404 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 80 PID 3460 wrote to memory of 5080 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 81 PID 3460 wrote to memory of 5080 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 81 PID 3460 wrote to memory of 5080 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 81 PID 3460 wrote to memory of 5112 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 83 PID 3460 wrote to memory of 5112 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 83 PID 3460 wrote to memory of 5112 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 83 PID 3460 wrote to memory of 1424 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 85 PID 3460 wrote to memory of 1424 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 85 PID 3460 wrote to memory of 1424 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 85 PID 3460 wrote to memory of 1688 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 87 PID 3460 wrote to memory of 1688 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 87 PID 3460 wrote to memory of 1688 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 87 PID 3460 wrote to memory of 1336 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 90 PID 3460 wrote to memory of 1336 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 90 PID 3460 wrote to memory of 1336 3460 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 90 PID 5112 wrote to memory of 3348 5112 cmd.exe 91 PID 5112 wrote to memory of 3348 5112 cmd.exe 91 PID 5112 wrote to memory of 3348 5112 cmd.exe 91 PID 3348 wrote to memory of 2892 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 92 PID 3348 wrote to memory of 2892 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 92 PID 3348 wrote to memory of 2892 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 92 PID 2892 wrote to memory of 176 2892 cmd.exe 94 PID 2892 wrote to memory of 176 2892 cmd.exe 94 PID 2892 wrote to memory of 176 2892 cmd.exe 94 PID 3348 wrote to memory of 3720 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 95 PID 3348 wrote to memory of 3720 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 95 PID 3348 wrote to memory of 3720 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 95 PID 3348 wrote to memory of 2028 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 96 PID 3348 wrote to memory of 2028 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 96 PID 3348 wrote to memory of 2028 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 96 PID 3348 wrote to memory of 2068 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 100 PID 3348 wrote to memory of 2068 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 100 PID 3348 wrote to memory of 2068 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 100 PID 176 wrote to memory of 4092 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 101 PID 176 wrote to memory of 4092 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 101 PID 176 wrote to memory of 4092 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 101 PID 176 wrote to memory of 3652 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 103 PID 176 wrote to memory of 3652 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 103 PID 176 wrote to memory of 3652 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 103 PID 176 wrote to memory of 3632 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 104 PID 176 wrote to memory of 3632 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 104 PID 176 wrote to memory of 3632 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 104 PID 176 wrote to memory of 1248 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 106 PID 176 wrote to memory of 1248 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 106 PID 176 wrote to memory of 1248 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 106 PID 4092 wrote to memory of 3040 4092 cmd.exe 109 PID 4092 wrote to memory of 3040 4092 cmd.exe 109 PID 4092 wrote to memory of 3040 4092 cmd.exe 109 PID 176 wrote to memory of 1116 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 111 PID 176 wrote to memory of 1116 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 111 PID 176 wrote to memory of 1116 176 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 111 PID 3348 wrote to memory of 2280 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 110 PID 3348 wrote to memory of 2280 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 110 PID 3348 wrote to memory of 2280 3348 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 110 PID 3040 wrote to memory of 1464 3040 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 115 PID 3040 wrote to memory of 1464 3040 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 115 PID 3040 wrote to memory of 1464 3040 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 115 PID 3040 wrote to memory of 4228 3040 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 116 PID 3040 wrote to memory of 4228 3040 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 116 PID 3040 wrote to memory of 4228 3040 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 116 PID 3040 wrote to memory of 1304 3040 70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe"C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\zmAcEYcU\eQUEYgkQ.exe"C:\Users\Admin\zmAcEYcU\eQUEYgkQ.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:3404
-
-
C:\ProgramData\ykUokcMA\gmwcQUQE.exe"C:\ProgramData\ykUokcMA\gmwcQUQE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"2⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"4⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"6⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"8⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"10⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"12⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"14⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"16⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"18⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"20⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"22⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"24⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"26⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"28⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"30⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"32⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d33⤵PID:3312
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies visibility of file extensions in Explorer
PID:4416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"34⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d35⤵PID:2624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"36⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d37⤵PID:4300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"38⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d39⤵PID:1336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"40⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d41⤵PID:4024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"42⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d43⤵PID:1664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"44⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d45⤵
- Adds Run key to start application
PID:2008 -
C:\Users\Admin\fksIMMsw\OWcEgAUk.exe"C:\Users\Admin\fksIMMsw\OWcEgAUk.exe"46⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 28847⤵
- Program crash
PID:4360
-
-
-
C:\ProgramData\diIsEgMY\BKkkgMUY.exe"C:\ProgramData\diIsEgMY\BKkkgMUY.exe"46⤵PID:4352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"46⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d47⤵PID:1688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"48⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d49⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"50⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d51⤵PID:4472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"52⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d53⤵PID:4088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"54⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d55⤵PID:2104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"56⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d57⤵PID:1004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"58⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d59⤵PID:5008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"60⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d61⤵PID:3052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"62⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d63⤵PID:4736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"64⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d65⤵PID:2432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"66⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d67⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"68⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d69⤵PID:868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"70⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d71⤵PID:1688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"72⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d73⤵PID:2412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"74⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d75⤵PID:504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"76⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d77⤵PID:404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"78⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d79⤵PID:3156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"80⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d81⤵PID:748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"82⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d83⤵PID:636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"84⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d85⤵PID:1504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"86⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d87⤵PID:2416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"88⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d89⤵PID:664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"90⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d91⤵PID:852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"92⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d93⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"94⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d95⤵PID:3268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"96⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d97⤵PID:636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"98⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d99⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"100⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d101⤵PID:5088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"102⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d103⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"104⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d105⤵PID:4448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"106⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d107⤵PID:1164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"108⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d109⤵PID:3984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"110⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d111⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"112⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d113⤵PID:4748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"114⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d115⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"116⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d117⤵PID:1492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"118⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d119⤵PID:240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"120⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d.exeC:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d121⤵PID:176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\70203bde8ec4511cf25954da695ec404255322057283730b002f611e98f3fe1d"122⤵PID:4592
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-