Analysis
-
max time kernel
161s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe
Resource
win10v2004-20220812-en
General
-
Target
e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe
-
Size
492KB
-
MD5
085183556b781c15ea5a237ac53c6960
-
SHA1
1a7840ccc90a5a7dd80e4653f5d4067808bfe1ec
-
SHA256
e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f
-
SHA512
3546043df94636fe1e8ff8ccb14eff99d9b84b54b2a4ff5e543087847b3bdb0c045731e7cec90a43ceb651809277b49113743831b7e23c85d67174c1515e5213
-
SSDEEP
12288:yEXe3kOEJHQq3cAuU+1gkTsdJNcSmWGIkLFOxJxtxtxVx+xUxqxlROia6zhrcxNX:Ne37EJHhqKkTIJmSmtIkLF8rffXsCYlE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\EQoAscEQ\\HkwoAAYk.exe," e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\EQoAscEQ\\HkwoAAYk.exe," e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\EQoAscEQ\\HkwoAAYk.exe,C:\\ProgramData\\diIsEgMY\\BKkkgMUY.exe," e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\EQoAscEQ\\HkwoAAYk.exe,C:\\ProgramData\\diIsEgMY\\BKkkgMUY.exe," e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2104 EkQkoUUg.exe 628 HkwoAAYk.exe 60 VSIoIcYw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation EkQkoUUg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OWcEgAUk.exe = "C:\\Users\\Admin\\fksIMMsw\\OWcEgAUk.exe" e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BKkkgMUY.exe = "C:\\ProgramData\\diIsEgMY\\BKkkgMUY.exe" e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EkQkoUUg.exe = "C:\\Users\\Admin\\iAQMgMso\\EkQkoUUg.exe" e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EkQkoUUg.exe = "C:\\Users\\Admin\\iAQMgMso\\EkQkoUUg.exe" EkQkoUUg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HkwoAAYk.exe = "C:\\ProgramData\\EQoAscEQ\\HkwoAAYk.exe" e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HkwoAAYk.exe = "C:\\ProgramData\\EQoAscEQ\\HkwoAAYk.exe" HkwoAAYk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HkwoAAYk.exe = "C:\\ProgramData\\EQoAscEQ\\HkwoAAYk.exe" VSIoIcYw.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheRegisterUnlock.jpeg EkQkoUUg.exe File opened for modification C:\Windows\SysWOW64\sheUninstallCompare.doc EkQkoUUg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\iAQMgMso VSIoIcYw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\iAQMgMso\EkQkoUUg VSIoIcYw.exe File created C:\Windows\SysWOW64\shell32.dll.exe EkQkoUUg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4652 1732 WerFault.exe 1072 1296 4576 WerFault.exe 1074 4848 1380 WerFault.exe 1069 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 6128 reg.exe 5220 reg.exe 2308 reg.exe 1436 reg.exe 1680 reg.exe 4068 reg.exe 1352 reg.exe 4760 reg.exe 3092 reg.exe 4504 reg.exe 4004 reg.exe 4384 reg.exe 5564 reg.exe 2832 reg.exe 1528 reg.exe 5020 reg.exe 1428 reg.exe 2396 reg.exe 1516 reg.exe 4664 reg.exe 224 reg.exe 1292 reg.exe 1352 reg.exe 5288 reg.exe 5456 reg.exe 5856 reg.exe 2880 reg.exe 1484 reg.exe 2560 reg.exe 3744 reg.exe 3624 reg.exe 1328 reg.exe 2540 reg.exe 4104 reg.exe 1808 reg.exe 6104 reg.exe 5076 reg.exe 1148 reg.exe 6112 reg.exe 5644 reg.exe 2560 reg.exe 5956 reg.exe 4072 reg.exe 3708 reg.exe 4784 reg.exe 1660 reg.exe 3088 reg.exe 5020 reg.exe 4512 reg.exe 5844 reg.exe 4648 reg.exe 1360 reg.exe 1888 reg.exe 5352 reg.exe 1148 reg.exe 1128 reg.exe 4580 reg.exe 5780 reg.exe 5916 reg.exe 848 reg.exe 4324 reg.exe 5364 reg.exe 4240 reg.exe 3996 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 1116 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 1116 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 1116 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 1116 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 2512 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 2512 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 2512 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 2512 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 1412 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 1412 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 1412 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 1412 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 2524 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 2524 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 2524 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 2524 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 3644 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 3644 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 3644 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 3644 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 2832 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 2832 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 2832 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 2832 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4508 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4508 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4508 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4508 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 3168 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 3168 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 3168 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 3168 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 208 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 208 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 208 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 208 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4732 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4732 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4732 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4732 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4424 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4424 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4424 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4424 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 3876 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 3876 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 3876 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 3876 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4344 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4344 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4344 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 4344 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2104 EkQkoUUg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe 2104 EkQkoUUg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2104 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 80 PID 4824 wrote to memory of 2104 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 80 PID 4824 wrote to memory of 2104 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 80 PID 4824 wrote to memory of 628 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 81 PID 4824 wrote to memory of 628 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 81 PID 4824 wrote to memory of 628 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 81 PID 4824 wrote to memory of 2300 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 83 PID 4824 wrote to memory of 2300 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 83 PID 4824 wrote to memory of 2300 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 83 PID 2300 wrote to memory of 1668 2300 cmd.exe 86 PID 2300 wrote to memory of 1668 2300 cmd.exe 86 PID 2300 wrote to memory of 1668 2300 cmd.exe 86 PID 4824 wrote to memory of 1800 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 85 PID 4824 wrote to memory of 1800 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 85 PID 4824 wrote to memory of 1800 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 85 PID 4824 wrote to memory of 4052 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 88 PID 4824 wrote to memory of 4052 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 88 PID 4824 wrote to memory of 4052 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 88 PID 4824 wrote to memory of 228 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 90 PID 4824 wrote to memory of 228 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 90 PID 4824 wrote to memory of 228 4824 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 90 PID 1668 wrote to memory of 4056 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 92 PID 1668 wrote to memory of 4056 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 92 PID 1668 wrote to memory of 4056 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 92 PID 4056 wrote to memory of 376 4056 cmd.exe 94 PID 4056 wrote to memory of 376 4056 cmd.exe 94 PID 4056 wrote to memory of 376 4056 cmd.exe 94 PID 1668 wrote to memory of 1312 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 95 PID 1668 wrote to memory of 1312 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 95 PID 1668 wrote to memory of 1312 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 95 PID 1668 wrote to memory of 3624 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 96 PID 1668 wrote to memory of 3624 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 96 PID 1668 wrote to memory of 3624 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 96 PID 1668 wrote to memory of 1484 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 98 PID 1668 wrote to memory of 1484 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 98 PID 1668 wrote to memory of 1484 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 98 PID 1668 wrote to memory of 3476 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 99 PID 1668 wrote to memory of 3476 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 99 PID 1668 wrote to memory of 3476 1668 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 99 PID 376 wrote to memory of 5088 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 103 PID 376 wrote to memory of 5088 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 103 PID 376 wrote to memory of 5088 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 103 PID 376 wrote to memory of 1144 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 105 PID 376 wrote to memory of 1144 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 105 PID 376 wrote to memory of 1144 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 105 PID 376 wrote to memory of 4504 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 107 PID 376 wrote to memory of 4504 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 107 PID 376 wrote to memory of 4504 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 107 PID 376 wrote to memory of 4756 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 111 PID 376 wrote to memory of 4756 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 111 PID 376 wrote to memory of 4756 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 111 PID 376 wrote to memory of 3312 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 108 PID 376 wrote to memory of 3312 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 108 PID 376 wrote to memory of 3312 376 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 108 PID 5088 wrote to memory of 1116 5088 cmd.exe 113 PID 5088 wrote to memory of 1116 5088 cmd.exe 113 PID 5088 wrote to memory of 1116 5088 cmd.exe 113 PID 3476 wrote to memory of 4492 3476 cmd.exe 114 PID 3476 wrote to memory of 4492 3476 cmd.exe 114 PID 3476 wrote to memory of 4492 3476 cmd.exe 114 PID 3312 wrote to memory of 3052 3312 cmd.exe 115 PID 3312 wrote to memory of 3052 3312 cmd.exe 115 PID 3312 wrote to memory of 3052 3312 cmd.exe 115 PID 1116 wrote to memory of 2700 1116 e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe"C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\iAQMgMso\EkQkoUUg.exe"C:\Users\Admin\iAQMgMso\EkQkoUUg.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2104
-
-
C:\ProgramData\EQoAscEQ\HkwoAAYk.exe"C:\ProgramData\EQoAscEQ\HkwoAAYk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"4⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"6⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"8⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"10⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"12⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"14⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"16⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"18⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"20⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"22⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f23⤵
- Suspicious behavior: EnumeratesProcesses
PID:208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"24⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"26⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"28⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"30⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"32⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f33⤵PID:2176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"34⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f35⤵PID:2180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"36⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f37⤵PID:3740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"38⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f39⤵PID:2700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"40⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f41⤵PID:2936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"42⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f43⤵PID:4144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"44⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f45⤵PID:4196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"46⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f47⤵PID:2548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"48⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f49⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"50⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f51⤵PID:1292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"52⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f53⤵PID:4220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"54⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f55⤵PID:5380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"56⤵PID:5428
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f57⤵PID:5656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"58⤵PID:5812
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f59⤵PID:6136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"60⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f61⤵PID:5276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"62⤵PID:5268
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f63⤵PID:5172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"64⤵PID:6020
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f65⤵PID:6044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"66⤵PID:6052
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f67⤵PID:5724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"68⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f69⤵PID:5412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"70⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f71⤵PID:3088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"72⤵PID:5284
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f73⤵PID:208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"74⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f75⤵PID:3312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"76⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f77⤵PID:376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"78⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f79⤵PID:5628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"80⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f81⤵PID:5244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"82⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f83⤵PID:2928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"84⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f85⤵PID:4920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"86⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f87⤵PID:3592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"88⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f89⤵PID:4400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"90⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f91⤵PID:5820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"92⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f93⤵PID:3828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"94⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f95⤵PID:2168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"96⤵PID:6128
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f97⤵PID:3588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"98⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f99⤵PID:484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"100⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f101⤵PID:8
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"102⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f103⤵PID:6012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"104⤵PID:5984
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f105⤵PID:1296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"106⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f107⤵PID:5140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"108⤵PID:5680
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f109⤵PID:5748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"110⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f111⤵PID:5900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"112⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f113⤵PID:5192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"114⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f115⤵PID:988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"116⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f117⤵PID:376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"118⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f119⤵PID:204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"120⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f.exeC:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f121⤵PID:4784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e6da50b24e675ea98bdae5c687e0bed984e5ae4a0cc7f1db7e49d225333e341f"122⤵PID:5592
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-