Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
d496103c4a9e8b738f8d73a30829c7a8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d496103c4a9e8b738f8d73a30829c7a8.exe
Resource
win10v2004-20240226-en
General
-
Target
d496103c4a9e8b738f8d73a30829c7a8.exe
-
Size
480KB
-
MD5
d496103c4a9e8b738f8d73a30829c7a8
-
SHA1
21e3d6419c50b42e94c7e80e9b8989cbf2492f74
-
SHA256
8e2fdc7ce094589f6c32d9dc108fb8deca7b6bffabcf415cfa034365d864029e
-
SHA512
35e135e01122e2c849fa6dc5529cab0954d9a689c07d7908e414459ee248a92808761ccccefd994ecde8e5f9a537b812985f976c07f777ba42123ad9397f0e14
-
SSDEEP
12288:gVAzXeh+/D6ZZP6v5ilkvT282xeRHzBrtAP6:gVieI/aZiv5NviNeRTMP6
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (53) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation cCQQkwkY.exe -
Executes dropped EXE 3 IoCs
pid Process 4780 cCQQkwkY.exe 1952 wqoUokYg.exe 3800 IcIwkcgA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cCQQkwkY.exe = "C:\\Users\\Admin\\jYcAggwQ\\cCQQkwkY.exe" d496103c4a9e8b738f8d73a30829c7a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wqoUokYg.exe = "C:\\ProgramData\\DsIgIQgI\\wqoUokYg.exe" d496103c4a9e8b738f8d73a30829c7a8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cCQQkwkY.exe = "C:\\Users\\Admin\\jYcAggwQ\\cCQQkwkY.exe" cCQQkwkY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wqoUokYg.exe = "C:\\ProgramData\\DsIgIQgI\\wqoUokYg.exe" wqoUokYg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wqoUokYg.exe = "C:\\ProgramData\\DsIgIQgI\\wqoUokYg.exe" IcIwkcgA.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheRenameSkip.gif cCQQkwkY.exe File opened for modification C:\Windows\SysWOW64\sheStepUndo.jpeg cCQQkwkY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\jYcAggwQ IcIwkcgA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\jYcAggwQ\cCQQkwkY IcIwkcgA.exe File created C:\Windows\SysWOW64\shell32.dll.exe cCQQkwkY.exe File opened for modification C:\Windows\SysWOW64\sheConvertToRevoke.docx cCQQkwkY.exe File opened for modification C:\Windows\SysWOW64\sheNewReset.zip cCQQkwkY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1976 reg.exe 3944 reg.exe 332 reg.exe 2320 reg.exe 3304 reg.exe 3988 reg.exe 3716 reg.exe 1456 reg.exe 2484 reg.exe 3368 reg.exe 4880 reg.exe 3648 reg.exe 2140 reg.exe 2104 reg.exe 1852 reg.exe 3240 reg.exe 2024 reg.exe 1052 reg.exe 1280 reg.exe 4300 reg.exe 4136 reg.exe 1084 reg.exe 5056 reg.exe 2240 reg.exe 2148 reg.exe 4280 reg.exe 1580 reg.exe 4948 reg.exe 8 reg.exe 2040 reg.exe 1332 reg.exe 3544 reg.exe 4332 reg.exe 1292 reg.exe 2100 reg.exe 3308 reg.exe 4572 reg.exe 2540 reg.exe 1092 reg.exe 3840 reg.exe 3668 reg.exe 2672 reg.exe 4952 reg.exe 988 reg.exe 5032 reg.exe 1176 reg.exe 2188 reg.exe 552 reg.exe 3424 reg.exe 4476 reg.exe 2172 reg.exe 4244 reg.exe 2276 reg.exe 3536 reg.exe 4560 reg.exe 1292 reg.exe 1900 reg.exe 4580 reg.exe 4488 reg.exe 4952 reg.exe 2540 reg.exe 2148 reg.exe 4324 reg.exe 572 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 2408 d496103c4a9e8b738f8d73a30829c7a8.exe 2408 d496103c4a9e8b738f8d73a30829c7a8.exe 2408 d496103c4a9e8b738f8d73a30829c7a8.exe 2408 d496103c4a9e8b738f8d73a30829c7a8.exe 2164 d496103c4a9e8b738f8d73a30829c7a8.exe 2164 d496103c4a9e8b738f8d73a30829c7a8.exe 2164 d496103c4a9e8b738f8d73a30829c7a8.exe 2164 d496103c4a9e8b738f8d73a30829c7a8.exe 3416 d496103c4a9e8b738f8d73a30829c7a8.exe 3416 d496103c4a9e8b738f8d73a30829c7a8.exe 3416 d496103c4a9e8b738f8d73a30829c7a8.exe 3416 d496103c4a9e8b738f8d73a30829c7a8.exe 572 d496103c4a9e8b738f8d73a30829c7a8.exe 572 d496103c4a9e8b738f8d73a30829c7a8.exe 572 d496103c4a9e8b738f8d73a30829c7a8.exe 572 d496103c4a9e8b738f8d73a30829c7a8.exe 4156 d496103c4a9e8b738f8d73a30829c7a8.exe 4156 d496103c4a9e8b738f8d73a30829c7a8.exe 4156 d496103c4a9e8b738f8d73a30829c7a8.exe 4156 d496103c4a9e8b738f8d73a30829c7a8.exe 4848 d496103c4a9e8b738f8d73a30829c7a8.exe 4848 d496103c4a9e8b738f8d73a30829c7a8.exe 4848 d496103c4a9e8b738f8d73a30829c7a8.exe 4848 d496103c4a9e8b738f8d73a30829c7a8.exe 5044 d496103c4a9e8b738f8d73a30829c7a8.exe 5044 d496103c4a9e8b738f8d73a30829c7a8.exe 5044 d496103c4a9e8b738f8d73a30829c7a8.exe 5044 d496103c4a9e8b738f8d73a30829c7a8.exe 2172 d496103c4a9e8b738f8d73a30829c7a8.exe 2172 d496103c4a9e8b738f8d73a30829c7a8.exe 2172 d496103c4a9e8b738f8d73a30829c7a8.exe 2172 d496103c4a9e8b738f8d73a30829c7a8.exe 3504 d496103c4a9e8b738f8d73a30829c7a8.exe 3504 d496103c4a9e8b738f8d73a30829c7a8.exe 3504 d496103c4a9e8b738f8d73a30829c7a8.exe 3504 d496103c4a9e8b738f8d73a30829c7a8.exe 2924 d496103c4a9e8b738f8d73a30829c7a8.exe 2924 d496103c4a9e8b738f8d73a30829c7a8.exe 2924 d496103c4a9e8b738f8d73a30829c7a8.exe 2924 d496103c4a9e8b738f8d73a30829c7a8.exe 4488 d496103c4a9e8b738f8d73a30829c7a8.exe 4488 d496103c4a9e8b738f8d73a30829c7a8.exe 4488 d496103c4a9e8b738f8d73a30829c7a8.exe 4488 d496103c4a9e8b738f8d73a30829c7a8.exe 4616 d496103c4a9e8b738f8d73a30829c7a8.exe 4616 d496103c4a9e8b738f8d73a30829c7a8.exe 4616 d496103c4a9e8b738f8d73a30829c7a8.exe 4616 d496103c4a9e8b738f8d73a30829c7a8.exe 4244 d496103c4a9e8b738f8d73a30829c7a8.exe 4244 d496103c4a9e8b738f8d73a30829c7a8.exe 4244 d496103c4a9e8b738f8d73a30829c7a8.exe 4244 d496103c4a9e8b738f8d73a30829c7a8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4780 cCQQkwkY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe 4780 cCQQkwkY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 4780 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 88 PID 2112 wrote to memory of 4780 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 88 PID 2112 wrote to memory of 4780 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 88 PID 2112 wrote to memory of 1952 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 89 PID 2112 wrote to memory of 1952 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 89 PID 2112 wrote to memory of 1952 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 89 PID 2112 wrote to memory of 4548 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 93 PID 2112 wrote to memory of 4548 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 93 PID 2112 wrote to memory of 4548 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 93 PID 4548 wrote to memory of 3556 4548 cmd.exe 95 PID 4548 wrote to memory of 3556 4548 cmd.exe 95 PID 4548 wrote to memory of 3556 4548 cmd.exe 95 PID 2112 wrote to memory of 3240 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 96 PID 2112 wrote to memory of 3240 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 96 PID 2112 wrote to memory of 3240 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 96 PID 2112 wrote to memory of 2320 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 97 PID 2112 wrote to memory of 2320 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 97 PID 2112 wrote to memory of 2320 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 97 PID 2112 wrote to memory of 1396 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 98 PID 2112 wrote to memory of 1396 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 98 PID 2112 wrote to memory of 1396 2112 d496103c4a9e8b738f8d73a30829c7a8.exe 98 PID 3556 wrote to memory of 2076 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 102 PID 3556 wrote to memory of 2076 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 102 PID 3556 wrote to memory of 2076 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 102 PID 3556 wrote to memory of 4700 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 104 PID 3556 wrote to memory of 4700 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 104 PID 3556 wrote to memory of 4700 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 104 PID 3556 wrote to memory of 3136 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 105 PID 3556 wrote to memory of 3136 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 105 PID 3556 wrote to memory of 3136 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 105 PID 3556 wrote to memory of 1580 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 106 PID 3556 wrote to memory of 1580 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 106 PID 3556 wrote to memory of 1580 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 106 PID 3556 wrote to memory of 5044 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 107 PID 3556 wrote to memory of 5044 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 107 PID 3556 wrote to memory of 5044 3556 d496103c4a9e8b738f8d73a30829c7a8.exe 107 PID 2076 wrote to memory of 3600 2076 cmd.exe 112 PID 2076 wrote to memory of 3600 2076 cmd.exe 112 PID 2076 wrote to memory of 3600 2076 cmd.exe 112 PID 5044 wrote to memory of 1280 5044 cmd.exe 113 PID 5044 wrote to memory of 1280 5044 cmd.exe 113 PID 5044 wrote to memory of 1280 5044 cmd.exe 113 PID 3600 wrote to memory of 4952 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 114 PID 3600 wrote to memory of 4952 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 114 PID 3600 wrote to memory of 4952 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 114 PID 3600 wrote to memory of 4488 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 116 PID 3600 wrote to memory of 4488 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 116 PID 3600 wrote to memory of 4488 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 116 PID 3600 wrote to memory of 3580 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 117 PID 3600 wrote to memory of 3580 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 117 PID 3600 wrote to memory of 3580 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 117 PID 3600 wrote to memory of 4928 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 118 PID 3600 wrote to memory of 4928 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 118 PID 3600 wrote to memory of 4928 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 118 PID 3600 wrote to memory of 1096 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 119 PID 3600 wrote to memory of 1096 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 119 PID 3600 wrote to memory of 1096 3600 d496103c4a9e8b738f8d73a30829c7a8.exe 119 PID 4952 wrote to memory of 2408 4952 cmd.exe 124 PID 4952 wrote to memory of 2408 4952 cmd.exe 124 PID 4952 wrote to memory of 2408 4952 cmd.exe 124 PID 1096 wrote to memory of 712 1096 cmd.exe 125 PID 1096 wrote to memory of 712 1096 cmd.exe 125 PID 1096 wrote to memory of 712 1096 cmd.exe 125 PID 2408 wrote to memory of 1988 2408 d496103c4a9e8b738f8d73a30829c7a8.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exe"C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\jYcAggwQ\cCQQkwkY.exe"C:\Users\Admin\jYcAggwQ\cCQQkwkY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4780
-
-
C:\ProgramData\DsIgIQgI\wqoUokYg.exe"C:\ProgramData\DsIgIQgI\wqoUokYg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"2⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a83⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"4⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a85⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"6⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a87⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"8⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a89⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"10⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a811⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"12⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a813⤵
- Suspicious behavior: EnumeratesProcesses
PID:572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"14⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a815⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"16⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a817⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"18⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a819⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"20⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a821⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"22⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a823⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"24⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a825⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"26⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a827⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"28⤵PID:2904
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a829⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"30⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a831⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"32⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a833⤵PID:1592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"34⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a835⤵PID:456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"36⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a837⤵PID:1096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"38⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a839⤵PID:2616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"40⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a841⤵PID:2968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"42⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a843⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"44⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a845⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"46⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a847⤵PID:2748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"48⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a849⤵PID:3412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"50⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a851⤵PID:3544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"52⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a853⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"54⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a855⤵PID:2208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"56⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a857⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"58⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a859⤵PID:880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"60⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a861⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"62⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a863⤵PID:4272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"64⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a865⤵PID:1292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"66⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a867⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"68⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a869⤵PID:4972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"70⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a871⤵PID:5008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"72⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a873⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"74⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a875⤵PID:1396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"76⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a877⤵PID:2004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"78⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a879⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"80⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a881⤵PID:2748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"82⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a883⤵PID:4784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"84⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a885⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"86⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a887⤵PID:3076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"88⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a889⤵PID:3940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"90⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a891⤵PID:1684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"92⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a893⤵PID:2956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"94⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a895⤵PID:5056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"96⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a897⤵PID:1220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"98⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a899⤵PID:1776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"100⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8101⤵PID:4396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"102⤵PID:2828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8103⤵PID:2104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"104⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8105⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"106⤵PID:820
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8107⤵PID:2928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"108⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8109⤵PID:2288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"110⤵PID:5044
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:3768
-
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8111⤵PID:4460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"112⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8113⤵PID:3716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"114⤵PID:4680
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8115⤵PID:2360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"116⤵PID:1224
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8117⤵PID:4076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"118⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8119⤵PID:1092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"120⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8.exeC:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8121⤵PID:400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\d496103c4a9e8b738f8d73a30829c7a8"122⤵PID:2824
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-