Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe
Resource
win10v2004-20240419-en
General
-
Target
065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe
-
Size
138KB
-
MD5
5b7d116dcd141409712d52fc2634151d
-
SHA1
735f53f6ae5eeb811cc8dfb0151be6e3ca1ce5d8
-
SHA256
065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be
-
SHA512
2935a1241377892efdac0cd989605a922e73b95278feb1f7c9c816cd868197c42dc5223345a6fec7caec3a077dce3eef8001f8c6b7767822a3076a39f90ed7c3
-
SSDEEP
3072:n5v3H8Cip2wc2BQa8kyEU+1W8cW12s2hIbsini+KRIft5ZrDY0w7q/bUTFDQpu8z:n5v38Bct2IeUJC12obpPKiFXi7wwTFVE
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\International\Geo\Nation mgssEMMk.exe -
Executes dropped EXE 2 IoCs
pid Process 2840 ReYkcMQs.exe 2568 mgssEMMk.exe -
Loads dropped DLL 20 IoCs
pid Process 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mgssEMMk.exe = "C:\\ProgramData\\omYYoYYU\\mgssEMMk.exe" 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mgssEMMk.exe = "C:\\ProgramData\\omYYoYYU\\mgssEMMk.exe" mgssEMMk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\ReYkcMQs.exe = "C:\\Users\\Admin\\bcoIkQAg\\ReYkcMQs.exe" ReYkcMQs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\ReYkcMQs.exe = "C:\\Users\\Admin\\bcoIkQAg\\ReYkcMQs.exe" 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 984 reg.exe 984 reg.exe 1652 reg.exe 536 reg.exe 2932 reg.exe 1572 reg.exe 2304 reg.exe 1860 reg.exe 480 reg.exe 2760 reg.exe 2164 reg.exe 2044 reg.exe 1472 reg.exe 2640 reg.exe 1788 reg.exe 2712 reg.exe 2684 reg.exe 2732 reg.exe 1124 reg.exe 1364 reg.exe 2116 reg.exe 2428 reg.exe 2436 reg.exe 684 reg.exe 544 reg.exe 912 reg.exe 2512 reg.exe 1260 reg.exe 1172 reg.exe 1612 reg.exe 756 reg.exe 1484 reg.exe 2400 reg.exe 2496 reg.exe 1904 reg.exe 240 reg.exe 2216 reg.exe 868 reg.exe 684 reg.exe 324 reg.exe 2668 reg.exe 1412 reg.exe 2696 reg.exe 1012 reg.exe 1632 reg.exe 2072 reg.exe 1984 reg.exe 1280 reg.exe 108 reg.exe 2888 reg.exe 2852 reg.exe 1124 reg.exe 540 reg.exe 1900 reg.exe 2112 reg.exe 1952 reg.exe 2680 reg.exe 2980 reg.exe 2340 reg.exe 1540 reg.exe 356 reg.exe 2060 reg.exe 868 reg.exe 2992 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1356 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1356 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2312 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2312 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 384 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 384 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1672 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1672 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2176 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2176 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2652 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2652 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2920 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2920 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1036 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1036 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1720 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1720 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2356 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2356 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 292 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 292 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2500 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2500 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2344 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2344 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2316 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2316 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2924 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2924 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2864 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2864 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2512 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2512 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2456 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2456 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2500 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2500 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2360 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2360 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1936 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1936 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2100 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2100 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1248 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1248 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2552 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2552 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2184 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2184 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1792 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1792 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2448 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2448 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2808 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2808 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2364 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2364 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2568 mgssEMMk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe 2568 mgssEMMk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2840 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 28 PID 2220 wrote to memory of 2840 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 28 PID 2220 wrote to memory of 2840 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 28 PID 2220 wrote to memory of 2840 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 28 PID 2220 wrote to memory of 2568 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 29 PID 2220 wrote to memory of 2568 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 29 PID 2220 wrote to memory of 2568 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 29 PID 2220 wrote to memory of 2568 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 29 PID 2220 wrote to memory of 2340 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 30 PID 2220 wrote to memory of 2340 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 30 PID 2220 wrote to memory of 2340 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 30 PID 2220 wrote to memory of 2340 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 30 PID 2340 wrote to memory of 2540 2340 cmd.exe 32 PID 2340 wrote to memory of 2540 2340 cmd.exe 32 PID 2340 wrote to memory of 2540 2340 cmd.exe 32 PID 2340 wrote to memory of 2540 2340 cmd.exe 32 PID 2220 wrote to memory of 2640 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 33 PID 2220 wrote to memory of 2640 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 33 PID 2220 wrote to memory of 2640 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 33 PID 2220 wrote to memory of 2640 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 33 PID 2220 wrote to memory of 2620 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 34 PID 2220 wrote to memory of 2620 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 34 PID 2220 wrote to memory of 2620 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 34 PID 2220 wrote to memory of 2620 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 34 PID 2220 wrote to memory of 2560 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 36 PID 2220 wrote to memory of 2560 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 36 PID 2220 wrote to memory of 2560 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 36 PID 2220 wrote to memory of 2560 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 36 PID 2220 wrote to memory of 2376 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 39 PID 2220 wrote to memory of 2376 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 39 PID 2220 wrote to memory of 2376 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 39 PID 2220 wrote to memory of 2376 2220 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 39 PID 2376 wrote to memory of 2812 2376 cmd.exe 41 PID 2376 wrote to memory of 2812 2376 cmd.exe 41 PID 2376 wrote to memory of 2812 2376 cmd.exe 41 PID 2376 wrote to memory of 2812 2376 cmd.exe 41 PID 2540 wrote to memory of 1200 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 42 PID 2540 wrote to memory of 1200 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 42 PID 2540 wrote to memory of 1200 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 42 PID 2540 wrote to memory of 1200 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 42 PID 1200 wrote to memory of 1356 1200 cmd.exe 44 PID 1200 wrote to memory of 1356 1200 cmd.exe 44 PID 1200 wrote to memory of 1356 1200 cmd.exe 44 PID 1200 wrote to memory of 1356 1200 cmd.exe 44 PID 2540 wrote to memory of 2668 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 45 PID 2540 wrote to memory of 2668 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 45 PID 2540 wrote to memory of 2668 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 45 PID 2540 wrote to memory of 2668 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 45 PID 2540 wrote to memory of 2556 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 46 PID 2540 wrote to memory of 2556 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 46 PID 2540 wrote to memory of 2556 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 46 PID 2540 wrote to memory of 2556 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 46 PID 2540 wrote to memory of 756 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 48 PID 2540 wrote to memory of 756 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 48 PID 2540 wrote to memory of 756 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 48 PID 2540 wrote to memory of 756 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 48 PID 2540 wrote to memory of 1004 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 50 PID 2540 wrote to memory of 1004 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 50 PID 2540 wrote to memory of 1004 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 50 PID 2540 wrote to memory of 1004 2540 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 50 PID 1004 wrote to memory of 1560 1004 cmd.exe 53 PID 1004 wrote to memory of 1560 1004 cmd.exe 53 PID 1004 wrote to memory of 1560 1004 cmd.exe 53 PID 1004 wrote to memory of 1560 1004 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe"C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\bcoIkQAg\ReYkcMQs.exe"C:\Users\Admin\bcoIkQAg\ReYkcMQs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2840
-
-
C:\ProgramData\omYYoYYU\mgssEMMk.exe"C:\ProgramData\omYYoYYU\mgssEMMk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2568
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"4⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"6⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"8⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be9⤵
- Suspicious behavior: EnumeratesProcesses
PID:384 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"10⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"12⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"14⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"16⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"18⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"20⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"22⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"24⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be25⤵
- Suspicious behavior: EnumeratesProcesses
PID:292 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"26⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"28⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"30⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"32⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"34⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"36⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"38⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"40⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"42⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"44⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"46⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"48⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"50⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"52⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"54⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"56⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"58⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"60⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"62⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"64⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be65⤵PID:1132
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"66⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be67⤵PID:896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"68⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be69⤵PID:1248
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"70⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be71⤵PID:2712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"72⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be73⤵PID:2996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"74⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be75⤵PID:1440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"76⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be77⤵PID:860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"78⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be79⤵PID:1976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"80⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be81⤵PID:2520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"82⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be83⤵PID:2492
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"84⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be85⤵PID:3028
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"86⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be87⤵PID:2584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"88⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be89⤵PID:2396
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"90⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be91⤵PID:448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"92⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be93⤵PID:2052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"94⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be95⤵PID:1468
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"96⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be97⤵PID:1840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"98⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be99⤵PID:2148
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"100⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be101⤵PID:856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"102⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be103⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"104⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be105⤵PID:2500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"106⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be107⤵PID:1568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"108⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be109⤵PID:2360
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"110⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be111⤵PID:3032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"112⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be113⤵PID:284
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"114⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be115⤵PID:2168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"116⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be117⤵PID:2408
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"118⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be119⤵PID:684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"120⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be121⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"122⤵PID:3060
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-