Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe
Resource
win10v2004-20220812-en
General
-
Target
4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe
-
Size
440KB
-
MD5
1eb8033b1a5cc820d35e9817dc78c7a0
-
SHA1
2bc4af70087979ecba6277ba323e3685eb5c5af1
-
SHA256
4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204
-
SHA512
238bd8332fb213f71eec34f3227f288dbac2b8cea70ae5a056dfab7c5b80f2848c0f54c2ca786dc26cc1f42116ef47491363c15d45a3b41d0f96eedd11810f35
-
SSDEEP
12288:1XGHKWlOrYA/ELs7gCDAilvE48kmX9v7WLkNNZB4:Al4YYkCv848n9zocNZW
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 60 dCEMYgQA.exe 4568 caIsoIAo.exe 4104 LuEEQIAY.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dCEMYgQA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\caIsoIAo.exe = "C:\\ProgramData\\SIUUoUoc\\caIsoIAo.exe" caIsoIAo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\caIsoIAo.exe = "C:\\ProgramData\\SIUUoUoc\\caIsoIAo.exe" LuEEQIAY.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dCEMYgQA.exe = "C:\\Users\\Admin\\lawcsAAg\\dCEMYgQA.exe" 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dCEMYgQA.exe = "C:\\Users\\Admin\\lawcsAAg\\dCEMYgQA.exe" dCEMYgQA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\caIsoIAo.exe = "C:\\ProgramData\\SIUUoUoc\\caIsoIAo.exe" 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\lawcsAAg\dCEMYgQA LuEEQIAY.exe File created C:\Windows\SysWOW64\shell32.dll.exe dCEMYgQA.exe File opened for modification C:\Windows\SysWOW64\sheConnectEnter.jpg dCEMYgQA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\lawcsAAg LuEEQIAY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4656 reg.exe 3808 reg.exe 5056 reg.exe 4468 reg.exe 4148 reg.exe 4284 reg.exe 1084 reg.exe 2712 reg.exe 1440 reg.exe 3412 reg.exe 4628 reg.exe 3568 reg.exe 5100 reg.exe 3012 reg.exe 1804 reg.exe 828 reg.exe 4312 reg.exe 2652 reg.exe 1644 reg.exe 4268 reg.exe 1440 reg.exe 568 reg.exe 952 reg.exe 4044 reg.exe 1992 reg.exe 4264 reg.exe 4400 reg.exe 2632 reg.exe 2880 reg.exe 3932 reg.exe 1572 reg.exe 3248 reg.exe 4920 reg.exe 1656 reg.exe 4088 reg.exe 2652 reg.exe 3488 reg.exe 4640 reg.exe 4768 reg.exe 4084 reg.exe 5060 reg.exe 1648 reg.exe 4100 reg.exe 4092 reg.exe 1452 reg.exe 1776 reg.exe 4820 reg.exe 3128 reg.exe 116 reg.exe 2120 reg.exe 4476 reg.exe 812 reg.exe 3196 reg.exe 364 reg.exe 2692 reg.exe 2416 reg.exe 2364 reg.exe 4864 reg.exe 3508 reg.exe 4880 reg.exe 1028 reg.exe 2512 reg.exe 4164 reg.exe 5008 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 3500 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 3500 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 3500 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 3500 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 3144 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 3144 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 3144 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 3144 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4748 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4748 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4748 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4748 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2640 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2640 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2640 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2640 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2164 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2164 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2164 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2164 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 1656 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 1656 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 1656 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 1656 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4796 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4796 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4796 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4796 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2108 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2108 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2108 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2108 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 1832 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 1832 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 1832 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 1832 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2520 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2520 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2520 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2520 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4788 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4788 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4788 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 4788 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2164 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2164 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2164 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 2164 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 1480 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 1480 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 1480 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 1480 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 60 dCEMYgQA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe 60 dCEMYgQA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4004 wrote to memory of 60 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 80 PID 4004 wrote to memory of 60 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 80 PID 4004 wrote to memory of 60 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 80 PID 4004 wrote to memory of 4568 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 81 PID 4004 wrote to memory of 4568 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 81 PID 4004 wrote to memory of 4568 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 81 PID 4004 wrote to memory of 1868 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 83 PID 4004 wrote to memory of 1868 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 83 PID 4004 wrote to memory of 1868 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 83 PID 4004 wrote to memory of 4044 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 85 PID 4004 wrote to memory of 4044 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 85 PID 4004 wrote to memory of 4044 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 85 PID 1868 wrote to memory of 4908 1868 cmd.exe 86 PID 1868 wrote to memory of 4908 1868 cmd.exe 86 PID 1868 wrote to memory of 4908 1868 cmd.exe 86 PID 4004 wrote to memory of 2080 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 88 PID 4004 wrote to memory of 2080 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 88 PID 4004 wrote to memory of 2080 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 88 PID 4004 wrote to memory of 4788 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 91 PID 4004 wrote to memory of 4788 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 91 PID 4004 wrote to memory of 4788 4004 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 91 PID 4908 wrote to memory of 448 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 92 PID 4908 wrote to memory of 448 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 92 PID 4908 wrote to memory of 448 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 92 PID 4908 wrote to memory of 3204 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 94 PID 4908 wrote to memory of 3204 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 94 PID 4908 wrote to memory of 3204 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 94 PID 4908 wrote to memory of 4088 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 95 PID 4908 wrote to memory of 4088 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 95 PID 4908 wrote to memory of 4088 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 95 PID 4908 wrote to memory of 1992 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 97 PID 4908 wrote to memory of 1992 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 97 PID 4908 wrote to memory of 1992 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 97 PID 4908 wrote to memory of 1860 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 99 PID 4908 wrote to memory of 1860 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 99 PID 4908 wrote to memory of 1860 4908 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 99 PID 448 wrote to memory of 2124 448 cmd.exe 102 PID 448 wrote to memory of 2124 448 cmd.exe 102 PID 448 wrote to memory of 2124 448 cmd.exe 102 PID 1860 wrote to memory of 3088 1860 cmd.exe 103 PID 1860 wrote to memory of 3088 1860 cmd.exe 103 PID 1860 wrote to memory of 3088 1860 cmd.exe 103 PID 2124 wrote to memory of 2524 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 104 PID 2124 wrote to memory of 2524 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 104 PID 2124 wrote to memory of 2524 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 104 PID 2524 wrote to memory of 3500 2524 cmd.exe 106 PID 2524 wrote to memory of 3500 2524 cmd.exe 106 PID 2524 wrote to memory of 3500 2524 cmd.exe 106 PID 2124 wrote to memory of 3452 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 107 PID 2124 wrote to memory of 3452 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 107 PID 2124 wrote to memory of 3452 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 107 PID 2124 wrote to memory of 3508 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 108 PID 2124 wrote to memory of 3508 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 108 PID 2124 wrote to memory of 3508 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 108 PID 2124 wrote to memory of 1440 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 109 PID 2124 wrote to memory of 1440 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 109 PID 2124 wrote to memory of 1440 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 109 PID 2124 wrote to memory of 3200 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 113 PID 2124 wrote to memory of 3200 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 113 PID 2124 wrote to memory of 3200 2124 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 113 PID 3200 wrote to memory of 5008 3200 cmd.exe 115 PID 3200 wrote to memory of 5008 3200 cmd.exe 115 PID 3200 wrote to memory of 5008 3200 cmd.exe 115 PID 3500 wrote to memory of 4600 3500 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe 116 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe"C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\lawcsAAg\dCEMYgQA.exe"C:\Users\Admin\lawcsAAg\dCEMYgQA.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:60
-
-
C:\ProgramData\SIUUoUoc\caIsoIAo.exe"C:\ProgramData\SIUUoUoc\caIsoIAo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"2⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a012043⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"4⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a012045⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"6⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a012047⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"8⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a012049⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"10⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120411⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"12⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120413⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"14⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120415⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"16⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120417⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"18⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120419⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"20⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120421⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"22⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120423⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"24⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120425⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"26⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120427⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"28⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120429⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"30⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120431⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"32⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120433⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"34⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120435⤵PID:4164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"36⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120437⤵PID:2120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"38⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120439⤵PID:3776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"40⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120441⤵PID:3728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"42⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120443⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"44⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120445⤵PID:3536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"46⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120447⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:3932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"48⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120449⤵PID:2324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"50⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120451⤵PID:376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"52⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120453⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"54⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120455⤵PID:1020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"56⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120457⤵PID:3996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"58⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120459⤵PID:3532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"60⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120461⤵PID:2312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"62⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120463⤵PID:4392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"64⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120465⤵PID:2472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"66⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120467⤵PID:2304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"68⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120469⤵PID:672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"70⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120471⤵PID:1088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"72⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120473⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"74⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120475⤵PID:3804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"76⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120477⤵PID:4992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"78⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120479⤵PID:4244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"80⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120481⤵PID:384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"82⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120483⤵PID:2836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"84⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120485⤵PID:2404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"86⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120487⤵PID:2228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"88⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120489⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"90⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120491⤵PID:4788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"92⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120493⤵PID:1740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"94⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120495⤵PID:1580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"96⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120497⤵PID:4212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"98⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a0120499⤵PID:2376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"100⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204101⤵PID:4440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"102⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204103⤵PID:4784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"104⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204105⤵PID:1296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"106⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204107⤵PID:4280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"108⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204109⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"110⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204111⤵PID:928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"112⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204113⤵PID:2832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"114⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204115⤵PID:1772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"116⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204117⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"118⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204119⤵PID:3340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"120⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204.exeC:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204121⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204"122⤵PID:3508
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-