Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe
Resource
win10v2004-20220812-en
General
-
Target
ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe
-
Size
442KB
-
MD5
67745e5268513ec80e8c56f95fe9e340
-
SHA1
44e40f02fa8a0dee253585127d5ac8d6c21ba2b5
-
SHA256
ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4
-
SHA512
4dfed708a9d1e0a10d949a35a78ef74e826c0c1431628a7ab2bf9d3072c3be14d056e6ab36acb0e5bb199812355db8816e39c071b5672ec6ec91738110237bb6
-
SSDEEP
12288:I+oxj7Ch3Z5OV1qUC9QBAZNxeIZMorCaD1:I+o9qJ5OO6KZNxeIZMorCO
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4908 bmIwQsog.exe 2268 rIYIIgAk.exe 3560 iWoAgIQU.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bmIwQsog.exe = "C:\\Users\\Admin\\QugogoAU\\bmIwQsog.exe" bmIwQsog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rIYIIgAk.exe = "C:\\ProgramData\\dAUUgEYU\\rIYIIgAk.exe" rIYIIgAk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rIYIIgAk.exe = "C:\\ProgramData\\dAUUgEYU\\rIYIIgAk.exe" iWoAgIQU.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bmIwQsog.exe = "C:\\Users\\Admin\\QugogoAU\\bmIwQsog.exe" ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rIYIIgAk.exe = "C:\\ProgramData\\dAUUgEYU\\rIYIIgAk.exe" ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\QugogoAU iWoAgIQU.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\QugogoAU\bmIwQsog iWoAgIQU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1136 reg.exe 3172 reg.exe 5064 reg.exe 2096 reg.exe 1256 reg.exe 512 reg.exe 1960 reg.exe 3636 reg.exe 988 reg.exe 1888 reg.exe 2808 reg.exe 1388 reg.exe 4440 reg.exe 2180 reg.exe 1952 reg.exe 3972 reg.exe 4372 reg.exe 4428 reg.exe 3552 reg.exe 2148 reg.exe 3424 reg.exe 4428 reg.exe 4248 reg.exe 4272 reg.exe 2272 reg.exe 992 reg.exe 2960 reg.exe 3676 reg.exe 3968 reg.exe 2320 reg.exe 4280 reg.exe 1592 reg.exe 1428 reg.exe 4468 reg.exe 4100 reg.exe 1292 reg.exe 2560 reg.exe 4088 reg.exe 4748 reg.exe 2420 reg.exe 3964 reg.exe 1160 reg.exe 220 reg.exe 4348 reg.exe 4284 reg.exe 4060 reg.exe 2312 reg.exe 1456 reg.exe 3088 reg.exe 4376 reg.exe 1616 reg.exe 4888 reg.exe 2016 reg.exe 4696 reg.exe 540 reg.exe 4540 reg.exe 4036 reg.exe 1952 reg.exe 4960 reg.exe 2460 reg.exe 1120 reg.exe 640 reg.exe 4888 reg.exe 4148 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4332 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4332 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4332 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4332 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 2684 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 2684 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 2684 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 2684 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 1960 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 1960 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 1960 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 1960 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 400 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 400 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 400 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 400 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 5064 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 5064 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 5064 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 5064 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4636 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4636 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4636 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4636 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 3084 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 3084 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 3084 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 3084 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4532 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4532 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4532 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4532 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4468 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4468 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4468 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4468 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4568 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4568 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4568 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4568 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4636 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4636 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4636 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4636 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4252 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4252 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4252 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 4252 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 1428 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 1428 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 1428 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 1428 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4224 wrote to memory of 4908 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 84 PID 4224 wrote to memory of 4908 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 84 PID 4224 wrote to memory of 4908 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 84 PID 4224 wrote to memory of 2268 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 85 PID 4224 wrote to memory of 2268 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 85 PID 4224 wrote to memory of 2268 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 85 PID 4224 wrote to memory of 684 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 87 PID 4224 wrote to memory of 684 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 87 PID 4224 wrote to memory of 684 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 87 PID 684 wrote to memory of 1648 684 cmd.exe 89 PID 684 wrote to memory of 1648 684 cmd.exe 89 PID 684 wrote to memory of 1648 684 cmd.exe 89 PID 4224 wrote to memory of 3668 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 90 PID 4224 wrote to memory of 3668 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 90 PID 4224 wrote to memory of 3668 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 90 PID 4224 wrote to memory of 1952 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 92 PID 4224 wrote to memory of 1952 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 92 PID 4224 wrote to memory of 1952 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 92 PID 4224 wrote to memory of 4960 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 93 PID 4224 wrote to memory of 4960 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 93 PID 4224 wrote to memory of 4960 4224 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 93 PID 1648 wrote to memory of 1816 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 96 PID 1648 wrote to memory of 1816 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 96 PID 1648 wrote to memory of 1816 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 96 PID 1648 wrote to memory of 3812 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 98 PID 1648 wrote to memory of 3812 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 98 PID 1648 wrote to memory of 3812 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 98 PID 1816 wrote to memory of 4612 1816 cmd.exe 99 PID 1816 wrote to memory of 4612 1816 cmd.exe 99 PID 1816 wrote to memory of 4612 1816 cmd.exe 99 PID 1648 wrote to memory of 4488 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 102 PID 1648 wrote to memory of 4488 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 102 PID 1648 wrote to memory of 4488 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 102 PID 1648 wrote to memory of 5084 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 100 PID 1648 wrote to memory of 5084 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 100 PID 1648 wrote to memory of 5084 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 100 PID 1648 wrote to memory of 4432 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 104 PID 1648 wrote to memory of 4432 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 104 PID 1648 wrote to memory of 4432 1648 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 104 PID 4612 wrote to memory of 2312 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 108 PID 4612 wrote to memory of 2312 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 108 PID 4612 wrote to memory of 2312 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 108 PID 4612 wrote to memory of 1852 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 109 PID 4612 wrote to memory of 1852 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 109 PID 4612 wrote to memory of 1852 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 109 PID 4612 wrote to memory of 3748 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 111 PID 4612 wrote to memory of 3748 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 111 PID 4612 wrote to memory of 3748 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 111 PID 4612 wrote to memory of 2260 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 113 PID 4612 wrote to memory of 2260 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 113 PID 4612 wrote to memory of 2260 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 113 PID 4612 wrote to memory of 1888 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 114 PID 4612 wrote to memory of 1888 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 114 PID 4612 wrote to memory of 1888 4612 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 114 PID 2312 wrote to memory of 4332 2312 cmd.exe 117 PID 2312 wrote to memory of 4332 2312 cmd.exe 117 PID 2312 wrote to memory of 4332 2312 cmd.exe 117 PID 4332 wrote to memory of 1000 4332 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 118 PID 4332 wrote to memory of 1000 4332 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 118 PID 4332 wrote to memory of 1000 4332 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 118 PID 1000 wrote to memory of 2684 1000 cmd.exe 120 PID 1000 wrote to memory of 2684 1000 cmd.exe 120 PID 1000 wrote to memory of 2684 1000 cmd.exe 120 PID 4332 wrote to memory of 5016 4332 ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe"C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\QugogoAU\bmIwQsog.exe"C:\Users\Admin\QugogoAU\bmIwQsog.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4908
-
-
C:\ProgramData\dAUUgEYU\rIYIIgAk.exe"C:\ProgramData\dAUUgEYU\rIYIIgAk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"2⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c43⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"4⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c45⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"6⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c47⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"8⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"10⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c411⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"12⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c413⤵
- Suspicious behavior: EnumeratesProcesses
PID:400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"14⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c415⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"16⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c417⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"18⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c419⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"20⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c421⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"22⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c423⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"24⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c425⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"26⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c427⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"28⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c429⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"30⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c431⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"32⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c433⤵PID:1372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"34⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c435⤵PID:3456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"36⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c437⤵PID:1392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"38⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c439⤵PID:2660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"40⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c441⤵PID:2568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"42⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c443⤵PID:4916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"44⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c445⤵PID:1448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"46⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c447⤵PID:3164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"48⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c449⤵PID:4196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"50⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c451⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"52⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c453⤵PID:1288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"54⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c455⤵PID:2072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"56⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c457⤵PID:4252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"58⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c459⤵PID:3716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"60⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c461⤵PID:3832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"62⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c463⤵PID:4288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"64⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c465⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"66⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c467⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"68⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c469⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"70⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c471⤵PID:1276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"72⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c473⤵PID:624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"74⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c475⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"76⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c477⤵PID:1520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"78⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c479⤵PID:3884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"80⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c481⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"82⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c483⤵PID:1888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"84⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c485⤵PID:1964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"86⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c487⤵PID:3552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"88⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c489⤵PID:3520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"90⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c491⤵PID:4028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"92⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c493⤵PID:988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"94⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c495⤵PID:1548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"96⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c497⤵PID:3180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"98⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c499⤵PID:228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"100⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4101⤵PID:4684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"102⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4103⤵PID:2848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"104⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4105⤵PID:1388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"106⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4107⤵PID:1916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"108⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4109⤵PID:2712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"110⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4111⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"112⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4113⤵PID:4648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"114⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4115⤵PID:2808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"116⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4117⤵PID:2256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"118⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4119⤵PID:4152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"120⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4.exeC:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4121⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac3bcb42500dae24834b7b3460a102b3df58b0d9664b4cefb3d2584b74fdf0c4"122⤵PID:5016
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-