Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe
Resource
win10v2004-20240226-en
General
-
Target
3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe
-
Size
111KB
-
MD5
ef019e8914bd613e0f4839e5b7c848d1
-
SHA1
cbe8bbf68529c05f1c6e719ac472f2c066e10038
-
SHA256
3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e
-
SHA512
0caea7168b1a22ed31a007e5992d33a7ed6bccbef0ba2745e462c98b9faefef74458d84a5716789deca4e87b8fd8271134a4af76cfed956d2c3c32044b15073e
-
SSDEEP
1536:TYDrUowZUcK/rNfK8vtlTsYJjzZ9LCKJqByJx3RDPiMrVvsa1TrWzoX+KcqpHPXr:EkycMiotJTJDLRdJxLpWzoX9pHD1oX
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Control Panel\International\Geo\Nation PmkUgkgk.exe -
Deletes itself 1 IoCs
pid Process 2348 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3040 PmkUgkgk.exe 2520 BSogEscA.exe -
Loads dropped DLL 20 IoCs
pid Process 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\PmkUgkgk.exe = "C:\\Users\\Admin\\eYYwMAko\\PmkUgkgk.exe" 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\PmkUgkgk.exe = "C:\\Users\\Admin\\eYYwMAko\\PmkUgkgk.exe" PmkUgkgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BSogEscA.exe = "C:\\ProgramData\\CkcUYkQw\\BSogEscA.exe" 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BSogEscA.exe = "C:\\ProgramData\\CkcUYkQw\\BSogEscA.exe" BSogEscA.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico PmkUgkgk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1332 reg.exe 2820 reg.exe 1808 reg.exe 944 reg.exe 944 reg.exe 2208 reg.exe 548 reg.exe 2768 reg.exe 2284 reg.exe 1120 reg.exe 668 reg.exe 2716 reg.exe 1956 reg.exe 1612 reg.exe 2152 reg.exe 1412 reg.exe 2284 reg.exe 2664 reg.exe 2144 reg.exe 2768 reg.exe 2772 reg.exe 2672 reg.exe 1404 reg.exe 2148 reg.exe 2976 reg.exe 3068 reg.exe 2548 reg.exe 884 reg.exe 1096 reg.exe 2844 reg.exe 2624 reg.exe 980 reg.exe 3052 reg.exe 2660 reg.exe 1596 reg.exe 2688 reg.exe 3052 reg.exe 1972 reg.exe 2348 reg.exe 2552 reg.exe 320 reg.exe 2768 reg.exe 2024 reg.exe 1068 reg.exe 1764 reg.exe 1488 reg.exe 2416 reg.exe 2824 reg.exe 2452 reg.exe 1336 reg.exe 1624 reg.exe 2588 reg.exe 2792 reg.exe 2972 reg.exe 2228 reg.exe 2000 reg.exe 1728 reg.exe 2716 reg.exe 1148 reg.exe 1664 reg.exe 1972 reg.exe 2796 reg.exe 2212 reg.exe 3056 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1184 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1184 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 744 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 744 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1932 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1932 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1276 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1276 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2088 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2088 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2644 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2644 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1480 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1480 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2580 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2580 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1716 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1716 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 608 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 608 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2360 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2360 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2888 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2888 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 620 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 620 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2848 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2848 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1116 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1116 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2044 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2044 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2548 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2548 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2856 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2856 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2220 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2220 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2904 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2904 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2360 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2360 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 536 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 536 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 924 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 924 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1948 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1948 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 748 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 748 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1944 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1944 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1904 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 1904 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2032 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2032 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2748 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 2748 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3040 PmkUgkgk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe 3040 PmkUgkgk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3060 wrote to memory of 3040 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 28 PID 3060 wrote to memory of 3040 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 28 PID 3060 wrote to memory of 3040 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 28 PID 3060 wrote to memory of 3040 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 28 PID 3060 wrote to memory of 2520 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 29 PID 3060 wrote to memory of 2520 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 29 PID 3060 wrote to memory of 2520 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 29 PID 3060 wrote to memory of 2520 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 29 PID 3060 wrote to memory of 2888 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 30 PID 3060 wrote to memory of 2888 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 30 PID 3060 wrote to memory of 2888 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 30 PID 3060 wrote to memory of 2888 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 30 PID 2888 wrote to memory of 2676 2888 cmd.exe 33 PID 2888 wrote to memory of 2676 2888 cmd.exe 33 PID 2888 wrote to memory of 2676 2888 cmd.exe 33 PID 2888 wrote to memory of 2676 2888 cmd.exe 33 PID 3060 wrote to memory of 2560 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 32 PID 3060 wrote to memory of 2560 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 32 PID 3060 wrote to memory of 2560 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 32 PID 3060 wrote to memory of 2560 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 32 PID 3060 wrote to memory of 2420 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 34 PID 3060 wrote to memory of 2420 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 34 PID 3060 wrote to memory of 2420 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 34 PID 3060 wrote to memory of 2420 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 34 PID 3060 wrote to memory of 2416 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 35 PID 3060 wrote to memory of 2416 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 35 PID 3060 wrote to memory of 2416 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 35 PID 3060 wrote to memory of 2416 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 35 PID 3060 wrote to memory of 2412 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 38 PID 3060 wrote to memory of 2412 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 38 PID 3060 wrote to memory of 2412 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 38 PID 3060 wrote to memory of 2412 3060 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 38 PID 2412 wrote to memory of 2076 2412 cmd.exe 41 PID 2412 wrote to memory of 2076 2412 cmd.exe 41 PID 2412 wrote to memory of 2076 2412 cmd.exe 41 PID 2412 wrote to memory of 2076 2412 cmd.exe 41 PID 2676 wrote to memory of 472 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 42 PID 2676 wrote to memory of 472 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 42 PID 2676 wrote to memory of 472 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 42 PID 2676 wrote to memory of 472 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 42 PID 472 wrote to memory of 1184 472 cmd.exe 44 PID 472 wrote to memory of 1184 472 cmd.exe 44 PID 472 wrote to memory of 1184 472 cmd.exe 44 PID 472 wrote to memory of 1184 472 cmd.exe 44 PID 2676 wrote to memory of 1492 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 45 PID 2676 wrote to memory of 1492 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 45 PID 2676 wrote to memory of 1492 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 45 PID 2676 wrote to memory of 1492 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 45 PID 2676 wrote to memory of 2772 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 46 PID 2676 wrote to memory of 2772 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 46 PID 2676 wrote to memory of 2772 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 46 PID 2676 wrote to memory of 2772 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 46 PID 2676 wrote to memory of 2768 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 48 PID 2676 wrote to memory of 2768 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 48 PID 2676 wrote to memory of 2768 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 48 PID 2676 wrote to memory of 2768 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 48 PID 2676 wrote to memory of 2792 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 49 PID 2676 wrote to memory of 2792 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 49 PID 2676 wrote to memory of 2792 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 49 PID 2676 wrote to memory of 2792 2676 3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe 49 PID 2792 wrote to memory of 1824 2792 cmd.exe 53 PID 2792 wrote to memory of 1824 2792 cmd.exe 53 PID 2792 wrote to memory of 1824 2792 cmd.exe 53 PID 2792 wrote to memory of 1824 2792 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe"C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\eYYwMAko\PmkUgkgk.exe"C:\Users\Admin\eYYwMAko\PmkUgkgk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3040
-
-
C:\ProgramData\CkcUYkQw\BSogEscA.exe"C:\ProgramData\CkcUYkQw\BSogEscA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2520
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"4⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"6⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e7⤵
- Suspicious behavior: EnumeratesProcesses
PID:744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"8⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"10⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"12⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"14⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"16⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"18⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"20⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"22⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e23⤵
- Suspicious behavior: EnumeratesProcesses
PID:608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"24⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"26⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"28⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"30⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e31⤵
- Suspicious behavior: EnumeratesProcesses
PID:620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"32⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"34⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"36⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"38⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"40⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"42⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"44⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"46⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"48⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e49⤵
- Suspicious behavior: EnumeratesProcesses
PID:536 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"50⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e51⤵
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"52⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"54⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e55⤵
- Suspicious behavior: EnumeratesProcesses
PID:748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"56⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"58⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"60⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"62⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"64⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e65⤵PID:2980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"66⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e67⤵PID:1600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"68⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e69⤵PID:2764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"70⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e71⤵PID:2412
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"72⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e73⤵PID:2148
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"74⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e75⤵PID:2792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"76⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e77⤵PID:2544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"78⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e79⤵PID:984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"80⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e81⤵PID:1660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"82⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e83⤵PID:2236
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"84⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e85⤵PID:1516
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"86⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e87⤵PID:2216
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"88⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e89⤵PID:1884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"90⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e91⤵PID:1108
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"92⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e93⤵PID:2104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"94⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e95⤵PID:1664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"96⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e97⤵PID:756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"98⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e99⤵PID:572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"100⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e101⤵PID:2732
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"102⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e103⤵PID:2396
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"104⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e105⤵PID:1448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"106⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e107⤵PID:1724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"108⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e109⤵PID:2084
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"110⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e111⤵PID:612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"112⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e113⤵PID:1824
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"114⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e115⤵PID:2484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"116⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e117⤵PID:1648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"118⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e119⤵PID:1940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"120⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e.exeC:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e121⤵PID:2708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3aebcdd50b20739ee3298a4401641da74c6e00bfb0eaf84c93f9e4e9e5e8fc3e"122⤵PID:2148
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-