Analysis
-
max time kernel
150s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe
Resource
win10v2004-20240419-en
General
-
Target
065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe
-
Size
138KB
-
MD5
5b7d116dcd141409712d52fc2634151d
-
SHA1
735f53f6ae5eeb811cc8dfb0151be6e3ca1ce5d8
-
SHA256
065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be
-
SHA512
2935a1241377892efdac0cd989605a922e73b95278feb1f7c9c816cd868197c42dc5223345a6fec7caec3a077dce3eef8001f8c6b7767822a3076a39f90ed7c3
-
SSDEEP
3072:n5v3H8Cip2wc2BQa8kyEU+1W8cW12s2hIbsini+KRIft5ZrDY0w7q/bUTFDQpu8z:n5v38Bct2IeUJC12obpPKiFXi7wwTFVE
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (80) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 26 1052 Process not Found 28 1052 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation aeIsIIQk.exe -
Executes dropped EXE 2 IoCs
pid Process 2044 aeIsIIQk.exe 3488 tmcIsYgk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aeIsIIQk.exe = "C:\\Users\\Admin\\AKUkgQgU\\aeIsIIQk.exe" 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tmcIsYgk.exe = "C:\\ProgramData\\WCYsUcYQ\\tmcIsYgk.exe" 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aeIsIIQk.exe = "C:\\Users\\Admin\\AKUkgQgU\\aeIsIIQk.exe" aeIsIIQk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tmcIsYgk.exe = "C:\\ProgramData\\WCYsUcYQ\\tmcIsYgk.exe" tmcIsYgk.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell32.dll.exe aeIsIIQk.exe File created C:\Windows\SysWOW64\shell32.dll.exe aeIsIIQk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 3020 reg.exe 2216 reg.exe 3548 reg.exe 2740 reg.exe 2556 reg.exe 404 reg.exe 2704 reg.exe 2976 reg.exe 3472 reg.exe 1924 reg.exe 1664 reg.exe 4072 reg.exe 2328 reg.exe 2216 reg.exe 3080 reg.exe 3872 reg.exe 4620 reg.exe 4768 reg.exe 392 reg.exe 448 reg.exe 2652 reg.exe 4692 reg.exe 4852 reg.exe 3804 reg.exe 2760 reg.exe 4816 reg.exe 2944 reg.exe 1452 reg.exe 4416 reg.exe 3176 reg.exe 1944 reg.exe 3748 reg.exe 3424 reg.exe 4408 reg.exe 4248 reg.exe 3416 reg.exe 3708 reg.exe 4524 reg.exe 1624 reg.exe 4756 reg.exe 5020 reg.exe 1040 reg.exe 4356 reg.exe 4524 reg.exe 4336 reg.exe 1192 reg.exe 4496 reg.exe 3436 reg.exe 4276 reg.exe 2760 reg.exe 4648 reg.exe 2076 reg.exe 2264 reg.exe 1152 reg.exe 1192 reg.exe 3272 reg.exe 5036 reg.exe 3116 reg.exe 2300 reg.exe 2400 reg.exe 4864 reg.exe 4468 reg.exe 1544 reg.exe 536 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2384 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2384 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2384 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2384 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2712 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2712 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2712 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 2712 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4844 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4844 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4844 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4844 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 3416 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 3416 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 3416 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 3416 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4796 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4796 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4796 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4796 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 840 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 840 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 840 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 840 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4112 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4112 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4112 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4112 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4348 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4348 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4348 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4348 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1192 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1192 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1192 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1192 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 3040 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 3040 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 3040 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 3040 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4944 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4944 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4944 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4944 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1932 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1932 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1932 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 1932 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4508 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4508 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4508 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 4508 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2044 aeIsIIQk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe 2044 aeIsIIQk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 2044 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 83 PID 4000 wrote to memory of 2044 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 83 PID 4000 wrote to memory of 2044 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 83 PID 4000 wrote to memory of 3488 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 84 PID 4000 wrote to memory of 3488 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 84 PID 4000 wrote to memory of 3488 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 84 PID 4000 wrote to memory of 60 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 85 PID 4000 wrote to memory of 60 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 85 PID 4000 wrote to memory of 60 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 85 PID 60 wrote to memory of 968 60 cmd.exe 87 PID 60 wrote to memory of 968 60 cmd.exe 87 PID 60 wrote to memory of 968 60 cmd.exe 87 PID 4000 wrote to memory of 392 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 88 PID 4000 wrote to memory of 392 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 88 PID 4000 wrote to memory of 392 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 88 PID 4000 wrote to memory of 2188 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 89 PID 4000 wrote to memory of 2188 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 89 PID 4000 wrote to memory of 2188 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 89 PID 4000 wrote to memory of 3772 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 90 PID 4000 wrote to memory of 3772 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 90 PID 4000 wrote to memory of 3772 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 90 PID 4000 wrote to memory of 2160 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 91 PID 4000 wrote to memory of 2160 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 91 PID 4000 wrote to memory of 2160 4000 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 91 PID 968 wrote to memory of 4812 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 97 PID 968 wrote to memory of 4812 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 97 PID 968 wrote to memory of 4812 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 97 PID 2160 wrote to memory of 2280 2160 cmd.exe 99 PID 2160 wrote to memory of 2280 2160 cmd.exe 99 PID 2160 wrote to memory of 2280 2160 cmd.exe 99 PID 4812 wrote to memory of 3544 4812 cmd.exe 100 PID 4812 wrote to memory of 3544 4812 cmd.exe 100 PID 4812 wrote to memory of 3544 4812 cmd.exe 100 PID 968 wrote to memory of 2540 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 101 PID 968 wrote to memory of 2540 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 101 PID 968 wrote to memory of 2540 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 101 PID 968 wrote to memory of 4508 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 102 PID 968 wrote to memory of 4508 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 102 PID 968 wrote to memory of 4508 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 102 PID 968 wrote to memory of 1612 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 103 PID 968 wrote to memory of 1612 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 103 PID 968 wrote to memory of 1612 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 103 PID 968 wrote to memory of 4108 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 104 PID 968 wrote to memory of 4108 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 104 PID 968 wrote to memory of 4108 968 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 104 PID 4108 wrote to memory of 3412 4108 cmd.exe 171 PID 4108 wrote to memory of 3412 4108 cmd.exe 171 PID 4108 wrote to memory of 3412 4108 cmd.exe 171 PID 3544 wrote to memory of 1220 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 110 PID 3544 wrote to memory of 1220 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 110 PID 3544 wrote to memory of 1220 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 110 PID 1220 wrote to memory of 2384 1220 cmd.exe 183 PID 1220 wrote to memory of 2384 1220 cmd.exe 183 PID 1220 wrote to memory of 2384 1220 cmd.exe 183 PID 3544 wrote to memory of 1536 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 113 PID 3544 wrote to memory of 1536 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 113 PID 3544 wrote to memory of 1536 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 113 PID 3544 wrote to memory of 3076 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 114 PID 3544 wrote to memory of 3076 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 114 PID 3544 wrote to memory of 3076 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 114 PID 3544 wrote to memory of 1820 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 115 PID 3544 wrote to memory of 1820 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 115 PID 3544 wrote to memory of 1820 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 115 PID 3544 wrote to memory of 4604 3544 065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe"C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AKUkgQgU\aeIsIIQk.exe"C:\Users\Admin\AKUkgQgU\aeIsIIQk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2044
-
-
C:\ProgramData\WCYsUcYQ\tmcIsYgk.exe"C:\ProgramData\WCYsUcYQ\tmcIsYgk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"2⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"4⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"6⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"8⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"10⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"12⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"14⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"16⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be17⤵
- Suspicious behavior: EnumeratesProcesses
PID:840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"18⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"20⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"22⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"24⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"26⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"28⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"30⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"32⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be33⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"34⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be35⤵PID:1700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"36⤵PID:4824
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:3716
-
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be37⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"38⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be39⤵PID:1372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"40⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be41⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"42⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be43⤵PID:2960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"44⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be45⤵PID:2216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"46⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be47⤵PID:4892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"48⤵PID:3580
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be49⤵PID:4524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"50⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be51⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"52⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be53⤵PID:2812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"54⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be55⤵PID:4588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"56⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be57⤵PID:4416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"58⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be59⤵PID:2656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"60⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be61⤵PID:2272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"62⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be63⤵PID:448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"64⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be65⤵PID:2908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"66⤵PID:2976
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:3132
-
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be67⤵PID:3712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"68⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be69⤵PID:3416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"70⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be71⤵PID:2652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"72⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be73⤵PID:3980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"74⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be75⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"76⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be77⤵PID:4392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"78⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be79⤵PID:4988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"80⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be81⤵PID:1932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"82⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be83⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"84⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be85⤵PID:1592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"86⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be87⤵PID:2652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"88⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be89⤵PID:1412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"90⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be91⤵PID:344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"92⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be93⤵PID:1608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"94⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be95⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"96⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be97⤵PID:1036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"98⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be99⤵PID:716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"100⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be101⤵PID:1920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"102⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be103⤵PID:1448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"104⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be105⤵PID:1748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"106⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be107⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"108⤵PID:1984
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be109⤵PID:1452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"110⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be111⤵PID:1364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"112⤵PID:1376
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:3788
-
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be113⤵PID:2976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"114⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be115⤵PID:1976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"116⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be117⤵PID:3596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"118⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be119⤵PID:3872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"120⤵PID:716
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be.exeC:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be121⤵PID:1384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\065298b42028677b2db24bfc68b0354121ac0607fc8d2b6a7fdf72d687ef01be"122⤵PID:3868
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-