Analysis
-
max time kernel
115s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe
Resource
win10v2004-20220812-en
General
-
Target
625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe
-
Size
486KB
-
MD5
850e53749b5da616d21bce97e92c2d90
-
SHA1
763d2fe2d983289c403cc88554c23f2f19d58499
-
SHA256
625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c
-
SHA512
fb8536726ad34d25a130ca5cafab8b8218e0fa857835a3d794bfaa4b1172d1f3cbdd95d7f511069443e2b1eaacef40ae678352ae0e9662cf97de7792a9077b9f
-
SSDEEP
12288:mPPbulHLsM5XOTLzEoYsh69mY0oQHjtSv+Tslc:YPYsaGLI6o505UvU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\aIIEscco\\wuUIsMIY.exe," 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\ProgramData\\aIIEscco\\wuUIsMIY.exe," 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 43 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 1332 oUMEMIkE.exe 660 wuUIsMIY.exe 1532 eqsQkUcQ.exe -
Loads dropped DLL 22 IoCs
pid Process 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe 660 wuUIsMIY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\oUMEMIkE.exe = "C:\\Users\\Admin\\HeAAcsYA\\oUMEMIkE.exe" 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuUIsMIY.exe = "C:\\ProgramData\\aIIEscco\\wuUIsMIY.exe" 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\oUMEMIkE.exe = "C:\\Users\\Admin\\HeAAcsYA\\oUMEMIkE.exe" oUMEMIkE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuUIsMIY.exe = "C:\\ProgramData\\aIIEscco\\wuUIsMIY.exe" wuUIsMIY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wuUIsMIY.exe = "C:\\ProgramData\\aIIEscco\\wuUIsMIY.exe" eqsQkUcQ.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\HeAAcsYA eqsQkUcQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\HeAAcsYA\oUMEMIkE eqsQkUcQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 304 reg.exe 1068 reg.exe 1620 reg.exe 992 reg.exe 2624 reg.exe 2156 reg.exe 1160 reg.exe 1772 reg.exe 3044 reg.exe 2652 reg.exe 544 reg.exe 1240 reg.exe 1072 reg.exe 2124 reg.exe 1808 reg.exe 836 reg.exe 824 reg.exe 1988 reg.exe 1100 reg.exe 1500 reg.exe 1556 reg.exe 1320 reg.exe 2992 reg.exe 2844 reg.exe 1116 reg.exe 1012 reg.exe 276 reg.exe 2108 reg.exe 2984 reg.exe 280 reg.exe 1100 reg.exe 896 reg.exe 1808 reg.exe 544 reg.exe 1748 reg.exe 332 reg.exe 800 reg.exe 840 reg.exe 1464 reg.exe 2408 reg.exe 2068 reg.exe 2276 reg.exe 1716 reg.exe 1692 reg.exe 276 reg.exe 2816 reg.exe 792 reg.exe 2504 reg.exe 472 reg.exe 1796 reg.exe 1096 reg.exe 2824 reg.exe 2904 reg.exe 1816 reg.exe 1988 reg.exe 1976 reg.exe 240 reg.exe 1096 reg.exe 2808 reg.exe 828 reg.exe 1916 reg.exe 1616 reg.exe 1716 reg.exe 1976 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1984 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1984 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1104 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1104 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1556 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1556 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1620 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1620 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1636 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1636 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 436 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 436 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1260 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1260 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1364 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1364 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1116 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1116 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1520 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1520 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 964 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 964 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 800 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 800 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 276 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 276 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1276 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1276 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1944 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1944 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 980 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 980 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1556 Process not Found 1556 Process not Found 1668 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1668 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 924 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 924 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1096 cmd.exe 1096 cmd.exe 1972 cmd.exe 1972 cmd.exe 1716 reg.exe 1716 reg.exe 320 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 320 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1244 cscript.exe 1244 cscript.exe 1976 reg.exe 1976 reg.exe 692 cscript.exe 692 cscript.exe 240 reg.exe 240 reg.exe 1500 cmd.exe 1500 cmd.exe 1916 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1916 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1452 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 1452 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 948 wrote to memory of 1332 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 27 PID 948 wrote to memory of 1332 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 27 PID 948 wrote to memory of 1332 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 27 PID 948 wrote to memory of 1332 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 27 PID 948 wrote to memory of 660 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 28 PID 948 wrote to memory of 660 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 28 PID 948 wrote to memory of 660 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 28 PID 948 wrote to memory of 660 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 28 PID 948 wrote to memory of 572 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 30 PID 948 wrote to memory of 572 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 30 PID 948 wrote to memory of 572 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 30 PID 948 wrote to memory of 572 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 30 PID 572 wrote to memory of 344 572 cmd.exe 32 PID 572 wrote to memory of 344 572 cmd.exe 32 PID 572 wrote to memory of 344 572 cmd.exe 32 PID 572 wrote to memory of 344 572 cmd.exe 32 PID 948 wrote to memory of 824 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 33 PID 948 wrote to memory of 824 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 33 PID 948 wrote to memory of 824 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 33 PID 948 wrote to memory of 824 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 33 PID 948 wrote to memory of 792 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 34 PID 948 wrote to memory of 792 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 34 PID 948 wrote to memory of 792 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 34 PID 948 wrote to memory of 792 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 34 PID 948 wrote to memory of 840 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 36 PID 948 wrote to memory of 840 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 36 PID 948 wrote to memory of 840 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 36 PID 948 wrote to memory of 840 948 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 36 PID 344 wrote to memory of 1988 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 39 PID 344 wrote to memory of 1988 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 39 PID 344 wrote to memory of 1988 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 39 PID 344 wrote to memory of 1988 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 39 PID 1988 wrote to memory of 1984 1988 cmd.exe 41 PID 1988 wrote to memory of 1984 1988 cmd.exe 41 PID 1988 wrote to memory of 1984 1988 cmd.exe 41 PID 1988 wrote to memory of 1984 1988 cmd.exe 41 PID 344 wrote to memory of 828 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 42 PID 344 wrote to memory of 828 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 42 PID 344 wrote to memory of 828 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 42 PID 344 wrote to memory of 828 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 42 PID 344 wrote to memory of 1636 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 43 PID 344 wrote to memory of 1636 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 43 PID 344 wrote to memory of 1636 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 43 PID 344 wrote to memory of 1636 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 43 PID 344 wrote to memory of 1160 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 45 PID 344 wrote to memory of 1160 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 45 PID 344 wrote to memory of 1160 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 45 PID 344 wrote to memory of 1160 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 45 PID 344 wrote to memory of 1084 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 48 PID 344 wrote to memory of 1084 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 48 PID 344 wrote to memory of 1084 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 48 PID 344 wrote to memory of 1084 344 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 48 PID 1984 wrote to memory of 1320 1984 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 49 PID 1984 wrote to memory of 1320 1984 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 49 PID 1984 wrote to memory of 1320 1984 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 49 PID 1984 wrote to memory of 1320 1984 625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe 49 PID 1320 wrote to memory of 1104 1320 cmd.exe 52 PID 1320 wrote to memory of 1104 1320 cmd.exe 52 PID 1320 wrote to memory of 1104 1320 cmd.exe 52 PID 1320 wrote to memory of 1104 1320 cmd.exe 52 PID 1084 wrote to memory of 1908 1084 cmd.exe 53 PID 1084 wrote to memory of 1908 1084 cmd.exe 53 PID 1084 wrote to memory of 1908 1084 cmd.exe 53 PID 1084 wrote to memory of 1908 1084 cmd.exe 53 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe"C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\HeAAcsYA\oUMEMIkE.exe"C:\Users\Admin\HeAAcsYA\oUMEMIkE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1332
-
-
C:\ProgramData\aIIEscco\wuUIsMIY.exe"C:\ProgramData\aIIEscco\wuUIsMIY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:660
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"2⤵
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"4⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"6⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"8⤵PID:304
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"10⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"12⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"14⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c15⤵
- Suspicious behavior: EnumeratesProcesses
PID:436 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"16⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1260 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"18⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"20⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"22⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"24⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c25⤵
- Suspicious behavior: EnumeratesProcesses
PID:964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"26⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c27⤵
- Suspicious behavior: EnumeratesProcesses
PID:800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"28⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c29⤵
- Suspicious behavior: EnumeratesProcesses
PID:276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"30⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"32⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"34⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c35⤵
- Suspicious behavior: EnumeratesProcesses
PID:980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"36⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c37⤵PID:1556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"38⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"40⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c41⤵
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"42⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c43⤵PID:1096
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"44⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c45⤵PID:1972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"46⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c47⤵PID:1716
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"48⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c49⤵
- Suspicious behavior: EnumeratesProcesses
PID:320 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"50⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c51⤵PID:1244
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"52⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c53⤵
- Modifies visibility of file extensions in Explorer
PID:1976 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"54⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c55⤵PID:692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"56⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c57⤵PID:240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"58⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c59⤵PID:1500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"60⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"62⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1452 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"64⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c65⤵PID:1904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"66⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c67⤵PID:1692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"68⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c69⤵PID:1620
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"70⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c71⤵PID:1972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"72⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c73⤵PID:1040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"74⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c75⤵PID:1116
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"76⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c77⤵PID:1984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"78⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c79⤵PID:1544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"80⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c81⤵PID:1040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"82⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c83⤵PID:1384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"84⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c85⤵PID:2096
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"86⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c87⤵PID:2328
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"88⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c89⤵PID:2444
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"90⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c91⤵PID:2632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"92⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c93⤵PID:2868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"94⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c95⤵PID:3056
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"96⤵
- Modifies visibility of file extensions in Explorer
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c97⤵PID:2188
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"98⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c99⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"100⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c101⤵PID:2212
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"102⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c103⤵PID:2564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"104⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c105⤵PID:1116
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"106⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c107⤵PID:2868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"108⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c109⤵PID:2944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"110⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c111⤵PID:2272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"112⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c113⤵PID:2700
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"114⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c115⤵PID:2252
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"116⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c117⤵PID:948
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"118⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c119⤵PID:2556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"120⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c.exeC:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c121⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\625bae212bda0eca7e799b884ae6970b27a66f3200caa79f89acb359edc7366c"122⤵PID:1544
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-