Analysis
-
max time kernel
158s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe
Resource
win10v2004-20220812-en
General
-
Target
2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe
-
Size
791KB
-
MD5
62b2f79f23a8a9692a4564b81b111a10
-
SHA1
6c80f9da5fb64944ba710147876e94a4ca7bd3ef
-
SHA256
2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a
-
SHA512
3884825e2036e711442f8c6cd0e861662c1e546cea581e4739ff1e2c6c64694380c51e27eae2a7bd959b9be0f5a01ce8abf4839a40e9d7fdebd1038c4cc516bf
-
SSDEEP
12288:sLEdfbkQr8yW2WpIj5SX6DmbvKXj8gnAygBt9aGhad/JX+Q2vnxArDpHu:CEdfR8LmjO8UKzPnAJBb+JOQ2voNHu
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4960 UUkAMIwc.exe 1372 cMgwYQIo.exe 4080 gUMQMgEY.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation UUkAMIwc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUkAMIwc.exe = "C:\\Users\\Admin\\LIgkMYgU\\UUkAMIwc.exe" 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UUkAMIwc.exe = "C:\\Users\\Admin\\LIgkMYgU\\UUkAMIwc.exe" UUkAMIwc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cMgwYQIo.exe = "C:\\ProgramData\\vGcQIIYA\\cMgwYQIo.exe" 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cMgwYQIo.exe = "C:\\ProgramData\\vGcQIIYA\\cMgwYQIo.exe" cMgwYQIo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cMgwYQIo.exe = "C:\\ProgramData\\vGcQIIYA\\cMgwYQIo.exe" gUMQMgEY.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\LIgkMYgU gUMQMgEY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\LIgkMYgU\UUkAMIwc gUMQMgEY.exe File created C:\Windows\SysWOW64\shell32.dll.exe UUkAMIwc.exe File opened for modification C:\Windows\SysWOW64\sheInvokeWait.rar UUkAMIwc.exe File opened for modification C:\Windows\SysWOW64\sheUpdateGet.jpeg UUkAMIwc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 5008 reg.exe 1196 reg.exe 3328 reg.exe 3112 reg.exe 5020 reg.exe 400 reg.exe 4568 reg.exe 1668 reg.exe 2876 reg.exe 2696 reg.exe 1664 reg.exe 2560 reg.exe 4500 reg.exe 3228 reg.exe 4256 reg.exe 3456 reg.exe 312 reg.exe 3232 reg.exe 4396 reg.exe 3608 reg.exe 4416 reg.exe 3956 reg.exe 112 reg.exe 3140 reg.exe 4852 reg.exe 2420 reg.exe 3196 reg.exe 3564 reg.exe 1540 reg.exe 2472 reg.exe 4344 reg.exe 4056 reg.exe 3944 reg.exe 3468 reg.exe 1728 reg.exe 4224 reg.exe 3132 reg.exe 3776 reg.exe 1864 reg.exe 2308 reg.exe 3928 reg.exe 3164 reg.exe 2624 reg.exe 3340 reg.exe 3412 reg.exe 2952 reg.exe 4888 reg.exe 1180 reg.exe 2632 reg.exe 2476 reg.exe 2560 reg.exe 3456 reg.exe 2904 reg.exe 4600 reg.exe 2000 reg.exe 3196 reg.exe 3640 reg.exe 1664 reg.exe 1528 reg.exe 456 reg.exe 1196 reg.exe 3416 reg.exe 1844 reg.exe 4864 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4452 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4452 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4452 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4452 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 1484 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 1484 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 1484 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 1484 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2960 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2960 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2960 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2960 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3556 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3556 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3556 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3556 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3188 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3188 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3188 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3188 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4368 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4368 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4368 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4368 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3876 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3876 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3876 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3876 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2260 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2260 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2260 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2260 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2632 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2632 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2632 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2632 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2836 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2836 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2836 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 2836 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4008 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4008 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4008 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 4008 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 1624 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 1624 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 1624 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 1624 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3640 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3640 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3640 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 3640 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4960 UUkAMIwc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe 4960 UUkAMIwc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4960 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 81 PID 4968 wrote to memory of 4960 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 81 PID 4968 wrote to memory of 4960 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 81 PID 4968 wrote to memory of 1372 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 82 PID 4968 wrote to memory of 1372 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 82 PID 4968 wrote to memory of 1372 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 82 PID 4968 wrote to memory of 2476 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 84 PID 4968 wrote to memory of 2476 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 84 PID 4968 wrote to memory of 2476 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 84 PID 2476 wrote to memory of 2560 2476 cmd.exe 86 PID 2476 wrote to memory of 2560 2476 cmd.exe 86 PID 2476 wrote to memory of 2560 2476 cmd.exe 86 PID 4968 wrote to memory of 1912 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 87 PID 4968 wrote to memory of 1912 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 87 PID 4968 wrote to memory of 1912 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 87 PID 4968 wrote to memory of 4224 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 89 PID 4968 wrote to memory of 4224 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 89 PID 4968 wrote to memory of 4224 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 89 PID 4968 wrote to memory of 3132 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 91 PID 4968 wrote to memory of 3132 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 91 PID 4968 wrote to memory of 3132 4968 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 91 PID 2560 wrote to memory of 5108 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 93 PID 2560 wrote to memory of 5108 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 93 PID 2560 wrote to memory of 5108 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 93 PID 2560 wrote to memory of 4552 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 95 PID 2560 wrote to memory of 4552 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 95 PID 2560 wrote to memory of 4552 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 95 PID 2560 wrote to memory of 4612 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 96 PID 2560 wrote to memory of 4612 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 96 PID 2560 wrote to memory of 4612 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 96 PID 5108 wrote to memory of 4548 5108 cmd.exe 97 PID 5108 wrote to memory of 4548 5108 cmd.exe 97 PID 5108 wrote to memory of 4548 5108 cmd.exe 97 PID 2560 wrote to memory of 3776 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 99 PID 2560 wrote to memory of 3776 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 99 PID 2560 wrote to memory of 3776 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 99 PID 2560 wrote to memory of 548 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 101 PID 2560 wrote to memory of 548 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 101 PID 2560 wrote to memory of 548 2560 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 101 PID 4548 wrote to memory of 1360 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 104 PID 4548 wrote to memory of 1360 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 104 PID 4548 wrote to memory of 1360 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 104 PID 1360 wrote to memory of 4452 1360 cmd.exe 106 PID 1360 wrote to memory of 4452 1360 cmd.exe 106 PID 1360 wrote to memory of 4452 1360 cmd.exe 106 PID 4548 wrote to memory of 2204 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 107 PID 4548 wrote to memory of 2204 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 107 PID 4548 wrote to memory of 2204 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 107 PID 4548 wrote to memory of 3112 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 109 PID 4548 wrote to memory of 3112 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 109 PID 4548 wrote to memory of 3112 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 109 PID 4548 wrote to memory of 4344 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 110 PID 4548 wrote to memory of 4344 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 110 PID 4548 wrote to memory of 4344 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 110 PID 4548 wrote to memory of 1180 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 111 PID 4548 wrote to memory of 1180 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 111 PID 4548 wrote to memory of 1180 4548 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 111 PID 4452 wrote to memory of 3848 4452 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 112 PID 4452 wrote to memory of 3848 4452 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 112 PID 4452 wrote to memory of 3848 4452 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 112 PID 4452 wrote to memory of 2876 4452 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 117 PID 4452 wrote to memory of 2876 4452 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 117 PID 4452 wrote to memory of 2876 4452 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 117 PID 4452 wrote to memory of 2016 4452 2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe"C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\LIgkMYgU\UUkAMIwc.exe"C:\Users\Admin\LIgkMYgU\UUkAMIwc.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4960
-
-
C:\ProgramData\vGcQIIYA\cMgwYQIo.exe"C:\ProgramData\vGcQIIYA\cMgwYQIo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"2⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"4⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"6⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"8⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"10⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"12⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"14⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"16⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"18⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"20⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"22⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"24⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"26⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"28⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"30⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"32⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a33⤵PID:4116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"34⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a35⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"36⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a37⤵PID:3724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"38⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a39⤵PID:4248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"40⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a41⤵PID:2644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"42⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a43⤵PID:3048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"44⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a45⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"46⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a47⤵PID:1832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"48⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a49⤵PID:2260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"50⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a51⤵PID:3108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"52⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a53⤵PID:4252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"54⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a55⤵PID:548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"56⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a57⤵PID:1012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"58⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a59⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"60⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a61⤵PID:3924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"62⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a63⤵PID:488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"64⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a65⤵PID:3480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"66⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a67⤵PID:2920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"68⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a69⤵PID:3412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"70⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a71⤵PID:1460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"72⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a73⤵PID:4280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"74⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a75⤵PID:1728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"76⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a77⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"78⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a79⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"80⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a81⤵PID:4536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"82⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a83⤵PID:3980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"84⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a85⤵PID:4336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"86⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a87⤵PID:1284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"88⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a89⤵PID:1076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"90⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a91⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"92⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a93⤵PID:2376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"94⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a95⤵PID:3228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"96⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a97⤵PID:4180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"98⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a99⤵PID:3456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"100⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a101⤵PID:2352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"102⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a103⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"104⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a105⤵PID:2100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"106⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a107⤵PID:2952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"108⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a109⤵PID:4336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"110⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a111⤵PID:3612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"112⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a113⤵PID:4580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"114⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a115⤵PID:3336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"116⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a117⤵PID:1356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"118⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a119⤵PID:3104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"120⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a.exeC:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a121⤵PID:548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2b9fe3c29657b386cfa8853530b134e000a3015aa9e4aedb68ad8de6bb26752a"122⤵PID:3412
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-