Analysis
-
max time kernel
163s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 09:21
Static task
static1
Behavioral task
behavioral1
Sample
af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe
Resource
win10v2004-20221111-en
General
-
Target
af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe
-
Size
439KB
-
MD5
13927a54ef0ad71d600f3554ac427630
-
SHA1
4bff92d984441a869fdd2e44571213e9f87a2d68
-
SHA256
af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a
-
SHA512
05716d368f8179577afee6318078fc20179b04fcf84ab6f7ed41bd15228bd86becd070c55a70ef95f0d7e547c4ae57c718e5392853269ba1d1f747daeaf6dd6f
-
SSDEEP
12288:IhcUghLaFX9TupxkPAwtpbA6lJbaiamBWyYcuzzbUMcgnkqY:IGUmIXdupxrwtpbAgJD5rPUkL
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 3500 BgUgIAwk.exe 216 dSskUwUc.exe 2608 qeUQMQIk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation dSskUwUc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dSskUwUc.exe = "C:\\ProgramData\\VWgAIIMA\\dSskUwUc.exe" qeUQMQIk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BgUgIAwk.exe = "C:\\Users\\Admin\\RsggQQME\\BgUgIAwk.exe" af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dSskUwUc.exe = "C:\\ProgramData\\VWgAIIMA\\dSskUwUc.exe" af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BgUgIAwk.exe = "C:\\Users\\Admin\\RsggQQME\\BgUgIAwk.exe" BgUgIAwk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dSskUwUc.exe = "C:\\ProgramData\\VWgAIIMA\\dSskUwUc.exe" dSskUwUc.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheWatchGroup.jpg dSskUwUc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\RsggQQME qeUQMQIk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\RsggQQME\BgUgIAwk qeUQMQIk.exe File created C:\Windows\SysWOW64\shell32.dll.exe dSskUwUc.exe File opened for modification C:\Windows\SysWOW64\sheMeasureConvertFrom.zip dSskUwUc.exe File opened for modification C:\Windows\SysWOW64\sheRevokeGet.xlsm dSskUwUc.exe File opened for modification C:\Windows\SysWOW64\sheSplitProtect.jpg dSskUwUc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4676 reg.exe 4392 reg.exe 2932 reg.exe 4028 reg.exe 4620 reg.exe 4792 reg.exe 2412 reg.exe 2904 reg.exe 3952 reg.exe 4212 reg.exe 4760 reg.exe 3772 reg.exe 3736 reg.exe 1620 reg.exe 5036 reg.exe 5084 reg.exe 2144 reg.exe 4196 reg.exe 4736 reg.exe 1156 reg.exe 4560 reg.exe 1908 reg.exe 1788 reg.exe 4736 reg.exe 764 reg.exe 1292 reg.exe 4928 reg.exe 1620 reg.exe 1180 reg.exe 2212 reg.exe 4500 reg.exe 4856 reg.exe 1384 reg.exe 3416 reg.exe 3612 reg.exe 4116 reg.exe 872 reg.exe 4056 reg.exe 3928 reg.exe 2084 reg.exe 3448 reg.exe 3808 reg.exe 432 reg.exe 1008 reg.exe 3496 reg.exe 2312 reg.exe 4668 reg.exe 764 reg.exe 4356 reg.exe 3948 reg.exe 2768 reg.exe 2464 reg.exe 4168 reg.exe 3224 reg.exe 3188 reg.exe 2648 reg.exe 4532 reg.exe 1816 reg.exe 2340 reg.exe 1552 reg.exe 3168 reg.exe 4156 reg.exe 4660 reg.exe 3952 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4928 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4928 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4928 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4928 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4668 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4668 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4668 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4668 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 552 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 552 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 552 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 552 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1900 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1900 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1900 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1900 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1240 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1240 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1240 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 1240 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4536 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4536 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4536 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4536 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 2148 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 2148 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 2148 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 2148 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4020 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4020 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4020 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4020 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4512 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4512 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4512 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4512 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 3080 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 3080 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 3080 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 3080 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4784 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4784 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4784 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4784 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4168 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4168 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4168 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 4168 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 2148 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 2148 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 2148 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 2148 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 216 dSskUwUc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe 216 dSskUwUc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1180 wrote to memory of 3500 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 82 PID 1180 wrote to memory of 3500 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 82 PID 1180 wrote to memory of 3500 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 82 PID 1180 wrote to memory of 216 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 83 PID 1180 wrote to memory of 216 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 83 PID 1180 wrote to memory of 216 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 83 PID 1180 wrote to memory of 3764 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 85 PID 1180 wrote to memory of 3764 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 85 PID 1180 wrote to memory of 3764 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 85 PID 1180 wrote to memory of 4772 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 87 PID 1180 wrote to memory of 4772 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 87 PID 1180 wrote to memory of 4772 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 87 PID 1180 wrote to memory of 5056 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 88 PID 1180 wrote to memory of 5056 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 88 PID 1180 wrote to memory of 5056 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 88 PID 3764 wrote to memory of 3952 3764 cmd.exe 89 PID 3764 wrote to memory of 3952 3764 cmd.exe 89 PID 3764 wrote to memory of 3952 3764 cmd.exe 89 PID 1180 wrote to memory of 4192 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 91 PID 1180 wrote to memory of 4192 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 91 PID 1180 wrote to memory of 4192 1180 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 91 PID 3952 wrote to memory of 2104 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 94 PID 3952 wrote to memory of 2104 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 94 PID 3952 wrote to memory of 2104 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 94 PID 2104 wrote to memory of 484 2104 cmd.exe 96 PID 2104 wrote to memory of 484 2104 cmd.exe 96 PID 2104 wrote to memory of 484 2104 cmd.exe 96 PID 3952 wrote to memory of 4512 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 97 PID 3952 wrote to memory of 4512 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 97 PID 3952 wrote to memory of 4512 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 97 PID 3952 wrote to memory of 4220 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 99 PID 3952 wrote to memory of 4220 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 99 PID 3952 wrote to memory of 4220 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 99 PID 3952 wrote to memory of 900 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 103 PID 3952 wrote to memory of 900 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 103 PID 3952 wrote to memory of 900 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 103 PID 3952 wrote to memory of 4252 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 102 PID 3952 wrote to memory of 4252 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 102 PID 3952 wrote to memory of 4252 3952 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 102 PID 484 wrote to memory of 4460 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 105 PID 484 wrote to memory of 4460 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 105 PID 484 wrote to memory of 4460 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 105 PID 484 wrote to memory of 4284 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 107 PID 484 wrote to memory of 4284 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 107 PID 484 wrote to memory of 4284 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 107 PID 484 wrote to memory of 872 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 109 PID 484 wrote to memory of 872 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 109 PID 484 wrote to memory of 872 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 109 PID 484 wrote to memory of 1944 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 110 PID 484 wrote to memory of 1944 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 110 PID 484 wrote to memory of 1944 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 110 PID 484 wrote to memory of 4704 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 111 PID 484 wrote to memory of 4704 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 111 PID 484 wrote to memory of 4704 484 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 111 PID 4460 wrote to memory of 4928 4460 cmd.exe 115 PID 4460 wrote to memory of 4928 4460 cmd.exe 115 PID 4460 wrote to memory of 4928 4460 cmd.exe 115 PID 4704 wrote to memory of 1856 4704 cmd.exe 117 PID 4704 wrote to memory of 1856 4704 cmd.exe 117 PID 4704 wrote to memory of 1856 4704 cmd.exe 117 PID 4252 wrote to memory of 3468 4252 cmd.exe 116 PID 4252 wrote to memory of 3468 4252 cmd.exe 116 PID 4252 wrote to memory of 3468 4252 cmd.exe 116 PID 4928 wrote to memory of 1216 4928 af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe"C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\RsggQQME\BgUgIAwk.exe"C:\Users\Admin\RsggQQME\BgUgIAwk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3500
-
-
C:\ProgramData\VWgAIIMA\dSskUwUc.exe"C:\ProgramData\VWgAIIMA\dSskUwUc.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"2⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"4⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"6⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"8⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"10⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a11⤵
- Suspicious behavior: EnumeratesProcesses
PID:552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"12⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"14⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"16⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"18⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"20⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"22⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"24⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"26⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"28⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"30⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"32⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a33⤵PID:5036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"34⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a35⤵PID:4512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"36⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a37⤵PID:3172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"38⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a39⤵PID:4700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"40⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a41⤵PID:3916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"42⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a43⤵PID:2096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"44⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a45⤵PID:176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"46⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a47⤵PID:2288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"48⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a49⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"50⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a51⤵PID:4008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"52⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a53⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"54⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a55⤵PID:1076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"56⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a57⤵PID:4352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"58⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a59⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"60⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a61⤵PID:2780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"62⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a63⤵PID:4728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"64⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a65⤵PID:4456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"66⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a67⤵PID:2948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"68⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a69⤵PID:1096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"70⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a71⤵PID:3044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"72⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a73⤵PID:4240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"74⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a75⤵PID:2460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"76⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a77⤵PID:3420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"78⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a79⤵PID:1624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"80⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a81⤵PID:3836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"82⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a83⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"84⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a85⤵PID:2932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"86⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a87⤵PID:2812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"88⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a89⤵PID:4924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"90⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a91⤵PID:1788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"92⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a93⤵PID:4728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"94⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a95⤵PID:2348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"96⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a97⤵PID:4784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"98⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a99⤵PID:4452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"100⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a101⤵PID:4684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"102⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a103⤵PID:3080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"104⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a105⤵PID:3124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"106⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a107⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"108⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a109⤵PID:4536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"110⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a111⤵PID:4168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"112⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a113⤵PID:4892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"114⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a115⤵PID:2340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"116⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a117⤵PID:2768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"118⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a119⤵PID:1172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"120⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a.exeC:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a121⤵PID:3944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\af0b03c9e76aef0bf8ff3521fa5db168399fb5873ba7064be7d8da41e6df725a"122⤵PID:3344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-