Analysis
-
max time kernel
150s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06-07-2023 15:27
Static task
static1
Behavioral task
behavioral1
Sample
362146d6a41044exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
362146d6a41044exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
362146d6a41044exeexeexeex.exe
-
Size
333KB
-
MD5
362146d6a410440a779030ad65deabb9
-
SHA1
454ac225175d472c01dbdec4212e99648f48c413
-
SHA256
6edb40dcddaf4e96e92095e5356c3f10117b5ba3a32a6d97920d5841e8aa501d
-
SHA512
e53bb5fe9ae21a494abf042f9c981d3416bef85dbf8140ea11f1b300b26af298a13a02f03a6d93d025eaeba127292f5849592a012916b642d775733ba1c6e1f6
-
SSDEEP
6144:xx7jHdXEVAY7/a4WflasSQsyH1AR6nxqwa1hMGd5FXch656l3cs:PtXrY7/abasS9dSxq31Ld5uoc3cs
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
nKggUMwQ.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Control Panel\International\Geo\Nation nKggUMwQ.exe -
Deletes itself 1 IoCs
Processes:
pid process 2992 -
Executes dropped EXE 2 IoCs
Processes:
nKggUMwQ.exeVIgwIUQA.exepid process 2280 nKggUMwQ.exe 1596 VIgwIUQA.exe -
Loads dropped DLL 20 IoCs
Processes:
362146d6a41044exeexeexeex.exenKggUMwQ.exepid process 1384 362146d6a41044exeexeexeex.exe 1384 362146d6a41044exeexeexeex.exe 1384 362146d6a41044exeexeexeex.exe 1384 362146d6a41044exeexeexeex.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
362146d6a41044exeexeexeex.exenKggUMwQ.exeVIgwIUQA.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Run\nKggUMwQ.exe = "C:\\Users\\Admin\\KyYooYsE\\nKggUMwQ.exe" 362146d6a41044exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VIgwIUQA.exe = "C:\\ProgramData\\jkAowAAw\\VIgwIUQA.exe" 362146d6a41044exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Windows\CurrentVersion\Run\nKggUMwQ.exe = "C:\\Users\\Admin\\KyYooYsE\\nKggUMwQ.exe" nKggUMwQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VIgwIUQA.exe = "C:\\ProgramData\\jkAowAAw\\VIgwIUQA.exe" VIgwIUQA.exe -
Drops file in Windows directory 1 IoCs
Processes:
nKggUMwQ.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico nKggUMwQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 2788 reg.exe 1372 reg.exe 936 reg.exe 2264 reg.exe 1500 reg.exe 2340 reg.exe 2248 reg.exe 2568 reg.exe 2076 reg.exe 2584 reg.exe 1060 reg.exe 2316 reg.exe 2884 reg.exe 2528 reg.exe 2508 reg.exe 2492 reg.exe 2592 reg.exe 2876 reg.exe 2488 reg.exe 2980 reg.exe 1488 reg.exe 2452 reg.exe 2576 reg.exe 1636 reg.exe 2716 reg.exe 3008 reg.exe 2744 reg.exe 452 reg.exe 2772 reg.exe 2988 reg.exe 1956 reg.exe 760 reg.exe 2036 2296 reg.exe 1312 reg.exe 1572 reg.exe 2732 reg.exe 2584 reg.exe 2324 reg.exe 3064 reg.exe 304 reg.exe 976 reg.exe 2204 reg.exe 1336 reg.exe 2556 2872 reg.exe 1788 reg.exe 2744 reg.exe 1664 reg.exe 2348 reg.exe 1480 1308 760 reg.exe 936 reg.exe 976 reg.exe 2448 reg.exe 2572 reg.exe 1884 reg.exe 2060 reg.exe 2432 reg.exe 2608 reg.exe 1844 reg.exe 736 reg.exe 2872 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exe362146d6a41044exeexeexeex.exepid process 1384 362146d6a41044exeexeexeex.exe 1384 362146d6a41044exeexeexeex.exe 1704 362146d6a41044exeexeexeex.exe 1704 362146d6a41044exeexeexeex.exe 2708 362146d6a41044exeexeexeex.exe 2708 362146d6a41044exeexeexeex.exe 3028 362146d6a41044exeexeexeex.exe 3028 362146d6a41044exeexeexeex.exe 2744 362146d6a41044exeexeexeex.exe 2744 362146d6a41044exeexeexeex.exe 2984 362146d6a41044exeexeexeex.exe 2984 362146d6a41044exeexeexeex.exe 2384 362146d6a41044exeexeexeex.exe 2384 362146d6a41044exeexeexeex.exe 1608 362146d6a41044exeexeexeex.exe 1608 362146d6a41044exeexeexeex.exe 3024 362146d6a41044exeexeexeex.exe 3024 362146d6a41044exeexeexeex.exe 2520 362146d6a41044exeexeexeex.exe 2520 362146d6a41044exeexeexeex.exe 1796 362146d6a41044exeexeexeex.exe 1796 362146d6a41044exeexeexeex.exe 1900 362146d6a41044exeexeexeex.exe 1900 362146d6a41044exeexeexeex.exe 1700 362146d6a41044exeexeexeex.exe 1700 362146d6a41044exeexeexeex.exe 1644 362146d6a41044exeexeexeex.exe 1644 362146d6a41044exeexeexeex.exe 1208 362146d6a41044exeexeexeex.exe 1208 362146d6a41044exeexeexeex.exe 2644 362146d6a41044exeexeexeex.exe 2644 362146d6a41044exeexeexeex.exe 1844 362146d6a41044exeexeexeex.exe 1844 362146d6a41044exeexeexeex.exe 2132 362146d6a41044exeexeexeex.exe 2132 362146d6a41044exeexeexeex.exe 1952 362146d6a41044exeexeexeex.exe 1952 362146d6a41044exeexeexeex.exe 1312 362146d6a41044exeexeexeex.exe 1312 362146d6a41044exeexeexeex.exe 2632 362146d6a41044exeexeexeex.exe 2632 362146d6a41044exeexeexeex.exe 2248 362146d6a41044exeexeexeex.exe 2248 362146d6a41044exeexeexeex.exe 2548 362146d6a41044exeexeexeex.exe 2548 362146d6a41044exeexeexeex.exe 2320 362146d6a41044exeexeexeex.exe 2320 362146d6a41044exeexeexeex.exe 2984 362146d6a41044exeexeexeex.exe 2984 362146d6a41044exeexeexeex.exe 1928 362146d6a41044exeexeexeex.exe 1928 362146d6a41044exeexeexeex.exe 2780 362146d6a41044exeexeexeex.exe 2780 362146d6a41044exeexeexeex.exe 1648 362146d6a41044exeexeexeex.exe 1648 362146d6a41044exeexeexeex.exe 2580 362146d6a41044exeexeexeex.exe 2580 362146d6a41044exeexeexeex.exe 1824 362146d6a41044exeexeexeex.exe 1824 362146d6a41044exeexeexeex.exe 2328 362146d6a41044exeexeexeex.exe 2328 362146d6a41044exeexeexeex.exe 2652 362146d6a41044exeexeexeex.exe 2652 362146d6a41044exeexeexeex.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
Processes:
nKggUMwQ.exepid process 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe 2280 nKggUMwQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
362146d6a41044exeexeexeex.execmd.exe362146d6a41044exeexeexeex.execmd.execmd.execmd.exedescription pid process target process PID 1384 wrote to memory of 2280 1384 362146d6a41044exeexeexeex.exe nKggUMwQ.exe PID 1384 wrote to memory of 2280 1384 362146d6a41044exeexeexeex.exe nKggUMwQ.exe PID 1384 wrote to memory of 2280 1384 362146d6a41044exeexeexeex.exe nKggUMwQ.exe PID 1384 wrote to memory of 2280 1384 362146d6a41044exeexeexeex.exe nKggUMwQ.exe PID 1384 wrote to memory of 1596 1384 362146d6a41044exeexeexeex.exe VIgwIUQA.exe PID 1384 wrote to memory of 1596 1384 362146d6a41044exeexeexeex.exe VIgwIUQA.exe PID 1384 wrote to memory of 1596 1384 362146d6a41044exeexeexeex.exe VIgwIUQA.exe PID 1384 wrote to memory of 1596 1384 362146d6a41044exeexeexeex.exe VIgwIUQA.exe PID 1384 wrote to memory of 1344 1384 362146d6a41044exeexeexeex.exe cmd.exe PID 1384 wrote to memory of 1344 1384 362146d6a41044exeexeexeex.exe cmd.exe PID 1384 wrote to memory of 1344 1384 362146d6a41044exeexeexeex.exe cmd.exe PID 1384 wrote to memory of 1344 1384 362146d6a41044exeexeexeex.exe cmd.exe PID 1344 wrote to memory of 1704 1344 cmd.exe 362146d6a41044exeexeexeex.exe PID 1344 wrote to memory of 1704 1344 cmd.exe 362146d6a41044exeexeexeex.exe PID 1344 wrote to memory of 1704 1344 cmd.exe 362146d6a41044exeexeexeex.exe PID 1344 wrote to memory of 1704 1344 cmd.exe 362146d6a41044exeexeexeex.exe PID 1384 wrote to memory of 2140 1384 362146d6a41044exeexeexeex.exe reg.exe PID 1384 wrote to memory of 2140 1384 362146d6a41044exeexeexeex.exe reg.exe PID 1384 wrote to memory of 2140 1384 362146d6a41044exeexeexeex.exe reg.exe PID 1384 wrote to memory of 2140 1384 362146d6a41044exeexeexeex.exe reg.exe PID 1384 wrote to memory of 760 1384 362146d6a41044exeexeexeex.exe reg.exe PID 1384 wrote to memory of 760 1384 362146d6a41044exeexeexeex.exe reg.exe PID 1384 wrote to memory of 760 1384 362146d6a41044exeexeexeex.exe reg.exe PID 1384 wrote to memory of 760 1384 362146d6a41044exeexeexeex.exe reg.exe PID 1384 wrote to memory of 2956 1384 362146d6a41044exeexeexeex.exe reg.exe PID 1384 wrote to memory of 2956 1384 362146d6a41044exeexeexeex.exe reg.exe PID 1384 wrote to memory of 2956 1384 362146d6a41044exeexeexeex.exe reg.exe PID 1384 wrote to memory of 2956 1384 362146d6a41044exeexeexeex.exe reg.exe PID 1384 wrote to memory of 3040 1384 362146d6a41044exeexeexeex.exe cmd.exe PID 1384 wrote to memory of 3040 1384 362146d6a41044exeexeexeex.exe cmd.exe PID 1384 wrote to memory of 3040 1384 362146d6a41044exeexeexeex.exe cmd.exe PID 1384 wrote to memory of 3040 1384 362146d6a41044exeexeexeex.exe cmd.exe PID 1704 wrote to memory of 2676 1704 362146d6a41044exeexeexeex.exe cmd.exe PID 1704 wrote to memory of 2676 1704 362146d6a41044exeexeexeex.exe cmd.exe PID 1704 wrote to memory of 2676 1704 362146d6a41044exeexeexeex.exe cmd.exe PID 1704 wrote to memory of 2676 1704 362146d6a41044exeexeexeex.exe cmd.exe PID 3040 wrote to memory of 2576 3040 cmd.exe cscript.exe PID 3040 wrote to memory of 2576 3040 cmd.exe cscript.exe PID 3040 wrote to memory of 2576 3040 cmd.exe cscript.exe PID 3040 wrote to memory of 2576 3040 cmd.exe cscript.exe PID 2676 wrote to memory of 2708 2676 cmd.exe 362146d6a41044exeexeexeex.exe PID 2676 wrote to memory of 2708 2676 cmd.exe 362146d6a41044exeexeexeex.exe PID 2676 wrote to memory of 2708 2676 cmd.exe 362146d6a41044exeexeexeex.exe PID 2676 wrote to memory of 2708 2676 cmd.exe 362146d6a41044exeexeexeex.exe PID 1704 wrote to memory of 2608 1704 362146d6a41044exeexeexeex.exe reg.exe PID 1704 wrote to memory of 2608 1704 362146d6a41044exeexeexeex.exe reg.exe PID 1704 wrote to memory of 2608 1704 362146d6a41044exeexeexeex.exe reg.exe PID 1704 wrote to memory of 2608 1704 362146d6a41044exeexeexeex.exe reg.exe PID 1704 wrote to memory of 2784 1704 362146d6a41044exeexeexeex.exe reg.exe PID 1704 wrote to memory of 2784 1704 362146d6a41044exeexeexeex.exe reg.exe PID 1704 wrote to memory of 2784 1704 362146d6a41044exeexeexeex.exe reg.exe PID 1704 wrote to memory of 2784 1704 362146d6a41044exeexeexeex.exe reg.exe PID 1704 wrote to memory of 2776 1704 362146d6a41044exeexeexeex.exe reg.exe PID 1704 wrote to memory of 2776 1704 362146d6a41044exeexeexeex.exe reg.exe PID 1704 wrote to memory of 2776 1704 362146d6a41044exeexeexeex.exe reg.exe PID 1704 wrote to memory of 2776 1704 362146d6a41044exeexeexeex.exe reg.exe PID 1704 wrote to memory of 2644 1704 362146d6a41044exeexeexeex.exe cmd.exe PID 1704 wrote to memory of 2644 1704 362146d6a41044exeexeexeex.exe cmd.exe PID 1704 wrote to memory of 2644 1704 362146d6a41044exeexeexeex.exe cmd.exe PID 1704 wrote to memory of 2644 1704 362146d6a41044exeexeexeex.exe cmd.exe PID 2644 wrote to memory of 2520 2644 cmd.exe cscript.exe PID 2644 wrote to memory of 2520 2644 cmd.exe cscript.exe PID 2644 wrote to memory of 2520 2644 cmd.exe cscript.exe PID 2644 wrote to memory of 2520 2644 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\KyYooYsE\nKggUMwQ.exe"C:\Users\Admin\KyYooYsE\nKggUMwQ.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
-
C:\ProgramData\jkAowAAw\VIgwIUQA.exe"C:\ProgramData\jkAowAAw\VIgwIUQA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"6⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"8⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex9⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"10⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex11⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"12⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex13⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"14⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex15⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"16⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex17⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"18⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex19⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"20⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex21⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"22⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex23⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"24⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex25⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"26⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex27⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"28⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex29⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"30⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex31⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"32⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"34⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex35⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"36⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex37⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"38⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex39⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"40⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex41⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"42⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex43⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"44⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex45⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"46⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex47⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"48⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex49⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"50⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex51⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"52⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex53⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"54⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex55⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"56⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex57⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"58⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex59⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"60⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex61⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"62⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex63⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"64⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex65⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"66⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex67⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"68⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex69⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"70⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex71⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"72⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex73⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"74⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex75⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"76⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex77⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"78⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex79⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"80⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex81⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"82⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex83⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"84⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex85⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"86⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex87⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"88⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex89⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"90⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex91⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"92⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex93⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"94⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex95⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"96⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex97⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"98⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex99⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"100⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex101⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"102⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex103⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"104⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex105⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"106⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex107⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"108⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex109⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"110⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex111⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"112⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex113⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"114⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex115⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"116⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex117⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"118⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex119⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"120⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex121⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"122⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex123⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"124⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex125⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"126⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex127⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"128⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex129⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"130⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex131⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"132⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex133⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"134⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex135⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"136⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex137⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"138⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex139⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"140⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex141⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"142⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex143⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"144⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex145⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"146⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex147⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"148⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex149⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"150⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex151⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"152⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex153⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"154⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex155⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"156⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex157⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"158⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex159⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"160⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex161⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"162⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex163⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"164⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex165⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"166⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex167⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"168⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex169⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"170⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex171⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"172⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex173⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"174⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex175⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"176⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex177⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"178⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex179⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"180⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex181⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"182⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex183⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"184⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex185⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"186⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex187⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"188⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex189⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"190⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex191⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"192⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex193⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"194⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex195⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"196⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex197⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"198⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex199⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"200⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex201⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"202⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex203⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"204⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex205⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"206⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex207⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"208⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex209⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"210⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex211⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"212⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex213⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"214⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex215⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"216⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex217⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"218⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex219⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"220⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex221⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"222⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex223⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"224⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex225⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"226⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex227⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"228⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex229⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"230⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex231⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"232⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex233⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"234⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex235⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"236⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex237⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"238⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex239⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex"240⤵
-
C:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex.exeC:\Users\Admin\AppData\Local\Temp\362146d6a41044exeexeexeex241⤵