Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
184s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe
Resource
win10v2004-20220812-en
General
-
Target
1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe
-
Size
562KB
-
MD5
a29f4477a8ce8bf411be286ceb342400
-
SHA1
bf7b576187219d47f799483c74d6a5d3cac09a3f
-
SHA256
1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300
-
SHA512
779004c93d76706ed391e3b7e7f5d57bc879381aa31dfa66f7a643de6c69d412f326140fb6eb2db9a84ca76829e5fe3107fb9fb0daaa90ae01506badb5adb7b0
-
SSDEEP
12288:LCQeCjVr+8Yo3goxa6HkwlHk2uDN5zNWJS6rsDfjuGfy25d2:giVrbgox5kw5k20NJ6Rgju+5d2
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 1600 OaoUoskQ.exe 4324 uQEsYAQA.exe 3268 SYkcswEY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uQEsYAQA.exe = "C:\\ProgramData\\uYEooMYU\\uQEsYAQA.exe" 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OaoUoskQ.exe = "C:\\Users\\Admin\\aqwcAYYU\\OaoUoskQ.exe" OaoUoskQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uQEsYAQA.exe = "C:\\ProgramData\\uYEooMYU\\uQEsYAQA.exe" uQEsYAQA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uQEsYAQA.exe = "C:\\ProgramData\\uYEooMYU\\uQEsYAQA.exe" SYkcswEY.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OaoUoskQ.exe = "C:\\Users\\Admin\\aqwcAYYU\\OaoUoskQ.exe" 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\aqwcAYYU SYkcswEY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\aqwcAYYU\OaoUoskQ SYkcswEY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2848 reg.exe 1412 reg.exe 3924 reg.exe 3212 reg.exe 4932 reg.exe 1884 reg.exe 896 reg.exe 4064 reg.exe 3504 reg.exe 5096 reg.exe 3028 reg.exe 3604 reg.exe 3456 reg.exe 4284 reg.exe 3836 reg.exe 1276 reg.exe 2984 reg.exe 4744 reg.exe 2084 reg.exe 2728 reg.exe 4680 reg.exe 4964 reg.exe 3068 reg.exe 4628 reg.exe 504 reg.exe 3716 reg.exe 4376 reg.exe 5108 reg.exe 5008 reg.exe 1900 reg.exe 4776 reg.exe 3580 reg.exe 720 reg.exe 4408 reg.exe 628 reg.exe 4572 reg.exe 1448 reg.exe 4456 reg.exe 3184 reg.exe 2396 reg.exe 3712 reg.exe 824 reg.exe 4816 reg.exe 3692 reg.exe 1748 reg.exe 1836 reg.exe 1884 reg.exe 3420 reg.exe 2504 reg.exe 4140 reg.exe 3548 reg.exe 4064 reg.exe 404 reg.exe 5024 reg.exe 5032 reg.exe 3904 reg.exe 1216 reg.exe 644 reg.exe 1160 reg.exe 740 reg.exe 3380 reg.exe 4276 reg.exe 4128 reg.exe 3548 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4268 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4268 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4268 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4268 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4452 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4452 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4452 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4452 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1476 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1476 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1476 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1476 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2628 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2628 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2628 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2628 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1424 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1424 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1424 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 1424 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4932 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4932 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4932 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4932 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4184 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4184 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4184 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4184 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4992 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4992 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4992 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4992 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2348 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2348 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2348 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 2348 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 5020 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 5020 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 5020 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 5020 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4196 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4196 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4196 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4196 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4852 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4852 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4852 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 4852 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 720 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 720 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 720 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 720 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4188 wrote to memory of 1600 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 81 PID 4188 wrote to memory of 1600 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 81 PID 4188 wrote to memory of 1600 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 81 PID 4188 wrote to memory of 4324 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 82 PID 4188 wrote to memory of 4324 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 82 PID 4188 wrote to memory of 4324 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 82 PID 4188 wrote to memory of 1344 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 84 PID 4188 wrote to memory of 1344 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 84 PID 4188 wrote to memory of 1344 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 84 PID 1344 wrote to memory of 4244 1344 cmd.exe 86 PID 1344 wrote to memory of 4244 1344 cmd.exe 86 PID 1344 wrote to memory of 4244 1344 cmd.exe 86 PID 4188 wrote to memory of 4284 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 87 PID 4188 wrote to memory of 4284 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 87 PID 4188 wrote to memory of 4284 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 87 PID 4188 wrote to memory of 2084 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 92 PID 4188 wrote to memory of 2084 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 92 PID 4188 wrote to memory of 2084 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 92 PID 4188 wrote to memory of 3980 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 89 PID 4188 wrote to memory of 3980 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 89 PID 4188 wrote to memory of 3980 4188 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 89 PID 4244 wrote to memory of 216 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 93 PID 4244 wrote to memory of 216 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 93 PID 4244 wrote to memory of 216 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 93 PID 216 wrote to memory of 2396 216 cmd.exe 96 PID 216 wrote to memory of 2396 216 cmd.exe 96 PID 216 wrote to memory of 2396 216 cmd.exe 96 PID 4244 wrote to memory of 1164 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 95 PID 4244 wrote to memory of 1164 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 95 PID 4244 wrote to memory of 1164 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 95 PID 4244 wrote to memory of 3760 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 101 PID 4244 wrote to memory of 3760 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 101 PID 4244 wrote to memory of 3760 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 101 PID 4244 wrote to memory of 4876 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 97 PID 4244 wrote to memory of 4876 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 97 PID 4244 wrote to memory of 4876 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 97 PID 2396 wrote to memory of 4088 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 102 PID 2396 wrote to memory of 4088 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 102 PID 2396 wrote to memory of 4088 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 102 PID 4088 wrote to memory of 4268 4088 cmd.exe 104 PID 4088 wrote to memory of 4268 4088 cmd.exe 104 PID 4088 wrote to memory of 4268 4088 cmd.exe 104 PID 2396 wrote to memory of 444 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 105 PID 2396 wrote to memory of 444 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 105 PID 2396 wrote to memory of 444 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 105 PID 4244 wrote to memory of 1068 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 106 PID 4244 wrote to memory of 1068 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 106 PID 4244 wrote to memory of 1068 4244 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 106 PID 2396 wrote to memory of 1924 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 107 PID 2396 wrote to memory of 1924 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 107 PID 2396 wrote to memory of 1924 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 107 PID 2396 wrote to memory of 2228 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 117 PID 2396 wrote to memory of 2228 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 117 PID 2396 wrote to memory of 2228 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 117 PID 2396 wrote to memory of 2712 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 110 PID 2396 wrote to memory of 2712 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 110 PID 2396 wrote to memory of 2712 2396 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 110 PID 4268 wrote to memory of 4592 4268 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 113 PID 4268 wrote to memory of 4592 4268 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 113 PID 4268 wrote to memory of 4592 4268 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 113 PID 4592 wrote to memory of 4452 4592 cmd.exe 115 PID 4592 wrote to memory of 4452 4592 cmd.exe 115 PID 4592 wrote to memory of 4452 4592 cmd.exe 115 PID 4268 wrote to memory of 404 4268 1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe"C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\aqwcAYYU\OaoUoskQ.exe"C:\Users\Admin\aqwcAYYU\OaoUoskQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1600
-
-
C:\ProgramData\uYEooMYU\uQEsYAQA.exe"C:\ProgramData\uYEooMYU\uQEsYAQA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"2⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13003⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"4⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13005⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"6⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13007⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"8⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b13009⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"10⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130011⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"12⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130013⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"14⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130015⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"16⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130017⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"18⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130019⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"20⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130021⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"22⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130023⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"24⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130025⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"26⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130027⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"28⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130029⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"30⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130031⤵
- Suspicious behavior: EnumeratesProcesses
PID:720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"32⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130033⤵PID:4844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"34⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130035⤵PID:3432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"36⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130037⤵PID:4012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"38⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130039⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"40⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130041⤵PID:4844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"42⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130043⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"44⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130045⤵PID:3116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"46⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130047⤵PID:3068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"48⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130049⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"50⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130051⤵PID:3596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"52⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130053⤵PID:2348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"54⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130055⤵PID:4272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"56⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130057⤵PID:2712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"58⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130059⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"60⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130061⤵PID:3932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"62⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130063⤵PID:888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"64⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130065⤵PID:1540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"66⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130067⤵PID:828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"68⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130069⤵PID:1440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"70⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130071⤵PID:4512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"72⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130073⤵PID:724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"74⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130075⤵PID:3492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"76⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130077⤵PID:4772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"78⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130079⤵PID:3836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"80⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130081⤵PID:1632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"82⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130083⤵PID:2440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"84⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130085⤵PID:5008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"86⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130087⤵PID:2420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"88⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130089⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"90⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130091⤵PID:3368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"92⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130093⤵PID:3604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"94⤵PID:424
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130095⤵PID:2736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"96⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130097⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"98⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b130099⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"100⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300101⤵PID:2724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"102⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300103⤵PID:656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"104⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300105⤵PID:396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"106⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300107⤵PID:3624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"108⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300109⤵PID:4268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"110⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300111⤵PID:1900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"112⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300113⤵PID:2412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"114⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300115⤵PID:3896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"116⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300117⤵PID:3584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"118⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300119⤵PID:4888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"120⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300.exeC:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300121⤵PID:1716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e7e6eb6a7a733f131498cc030825ac908e1706294800d5f19252910c08b1300"122⤵PID:1776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-