Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 23:54
Static task
static1
Behavioral task
behavioral1
Sample
62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe
Resource
win10v2004-20240508-en
General
-
Target
62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe
-
Size
208KB
-
MD5
67f8bc1f68d349d18faa2188d3cb4b07
-
SHA1
1a72055a7e2e602b11f7ed53aaaa7231240c89ee
-
SHA256
62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff
-
SHA512
ae6a720a7779af57ba3c0fb1b09f6d47a6f9dc8b64390846362627c5c304eccd4956e5d6ee5ca27d85522359c1d37fcc76227e8fb469f2de80802329f9cc8c36
-
SSDEEP
3072:we+nqymUiOlDoZImEKNsmN1+qONNbbKQkvuasNT+wadrttL9:8qy3iOlDoZxHvJMNfAvuh+wad7L9
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (57) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\International\Geo\Nation AgcgEYkk.exe -
Deletes itself 1 IoCs
pid Process 1848 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1104 AgcgEYkk.exe 2312 fekwcIwc.exe -
Loads dropped DLL 20 IoCs
pid Process 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\fekwcIwc.exe = "C:\\ProgramData\\KKYAkwsc\\fekwcIwc.exe" 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\AgcgEYkk.exe = "C:\\Users\\Admin\\tewAoIoQ\\AgcgEYkk.exe" AgcgEYkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\fekwcIwc.exe = "C:\\ProgramData\\KKYAkwsc\\fekwcIwc.exe" fekwcIwc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\AgcgEYkk.exe = "C:\\Users\\Admin\\tewAoIoQ\\AgcgEYkk.exe" 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2032 reg.exe 2200 reg.exe 1776 reg.exe 2004 reg.exe 2904 reg.exe 2716 reg.exe 2660 reg.exe 2980 reg.exe 2292 reg.exe 316 reg.exe 2772 reg.exe 1896 reg.exe 2600 reg.exe 864 reg.exe 2140 reg.exe 1192 reg.exe 2336 reg.exe 1840 reg.exe 1740 reg.exe 340 reg.exe 2956 reg.exe 2908 reg.exe 1244 reg.exe 1628 reg.exe 960 reg.exe 3068 reg.exe 1796 reg.exe 1180 reg.exe 2992 reg.exe 2120 reg.exe 540 reg.exe 892 reg.exe 2204 reg.exe 2672 reg.exe 1180 reg.exe 2860 reg.exe 2000 reg.exe 2804 reg.exe 1444 reg.exe 2388 reg.exe 1524 reg.exe 1196 reg.exe 2424 reg.exe 872 reg.exe 3004 reg.exe 2964 reg.exe 2056 reg.exe 1032 reg.exe 2736 reg.exe 1768 reg.exe 2384 reg.exe 1376 reg.exe 2800 reg.exe 3060 reg.exe 2464 reg.exe 1196 reg.exe 2008 reg.exe 2284 reg.exe 2008 reg.exe 2796 reg.exe 1956 reg.exe 1028 reg.exe 828 reg.exe 2548 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1932 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1932 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1632 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1632 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2052 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2052 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1372 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1372 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1496 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1496 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2712 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2712 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1288 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1288 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1272 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1272 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2368 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2368 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2348 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2348 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1600 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1600 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2068 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2068 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 3004 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 3004 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1620 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1620 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1832 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1832 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2836 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2836 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1244 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1244 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2552 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2552 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2492 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2492 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 3004 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 3004 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 800 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 800 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2788 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2788 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1304 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1304 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1904 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1904 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1980 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1980 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1664 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1664 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1272 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1272 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 988 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 988 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2188 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2188 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1104 AgcgEYkk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe 1104 AgcgEYkk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1104 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 28 PID 1224 wrote to memory of 1104 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 28 PID 1224 wrote to memory of 1104 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 28 PID 1224 wrote to memory of 1104 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 28 PID 1224 wrote to memory of 2312 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 29 PID 1224 wrote to memory of 2312 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 29 PID 1224 wrote to memory of 2312 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 29 PID 1224 wrote to memory of 2312 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 29 PID 1224 wrote to memory of 2968 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 30 PID 1224 wrote to memory of 2968 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 30 PID 1224 wrote to memory of 2968 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 30 PID 1224 wrote to memory of 2968 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 30 PID 2968 wrote to memory of 2692 2968 cmd.exe 33 PID 2968 wrote to memory of 2692 2968 cmd.exe 33 PID 2968 wrote to memory of 2692 2968 cmd.exe 33 PID 2968 wrote to memory of 2692 2968 cmd.exe 33 PID 1224 wrote to memory of 2644 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 32 PID 1224 wrote to memory of 2644 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 32 PID 1224 wrote to memory of 2644 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 32 PID 1224 wrote to memory of 2644 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 32 PID 1224 wrote to memory of 2624 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 34 PID 1224 wrote to memory of 2624 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 34 PID 1224 wrote to memory of 2624 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 34 PID 1224 wrote to memory of 2624 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 34 PID 1224 wrote to memory of 2632 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 35 PID 1224 wrote to memory of 2632 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 35 PID 1224 wrote to memory of 2632 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 35 PID 1224 wrote to memory of 2632 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 35 PID 1224 wrote to memory of 2744 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 36 PID 1224 wrote to memory of 2744 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 36 PID 1224 wrote to memory of 2744 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 36 PID 1224 wrote to memory of 2744 1224 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 36 PID 2744 wrote to memory of 2528 2744 cmd.exe 41 PID 2744 wrote to memory of 2528 2744 cmd.exe 41 PID 2744 wrote to memory of 2528 2744 cmd.exe 41 PID 2744 wrote to memory of 2528 2744 cmd.exe 41 PID 2692 wrote to memory of 2908 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 42 PID 2692 wrote to memory of 2908 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 42 PID 2692 wrote to memory of 2908 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 42 PID 2692 wrote to memory of 2908 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 42 PID 2908 wrote to memory of 1932 2908 cmd.exe 44 PID 2908 wrote to memory of 1932 2908 cmd.exe 44 PID 2908 wrote to memory of 1932 2908 cmd.exe 44 PID 2908 wrote to memory of 1932 2908 cmd.exe 44 PID 2692 wrote to memory of 1988 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 45 PID 2692 wrote to memory of 1988 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 45 PID 2692 wrote to memory of 1988 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 45 PID 2692 wrote to memory of 1988 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 45 PID 2692 wrote to memory of 1956 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 46 PID 2692 wrote to memory of 1956 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 46 PID 2692 wrote to memory of 1956 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 46 PID 2692 wrote to memory of 1956 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 46 PID 2692 wrote to memory of 1948 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 47 PID 2692 wrote to memory of 1948 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 47 PID 2692 wrote to memory of 1948 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 47 PID 2692 wrote to memory of 1948 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 47 PID 2692 wrote to memory of 1692 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 48 PID 2692 wrote to memory of 1692 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 48 PID 2692 wrote to memory of 1692 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 48 PID 2692 wrote to memory of 1692 2692 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 48 PID 1692 wrote to memory of 2408 1692 cmd.exe 53 PID 1692 wrote to memory of 2408 1692 cmd.exe 53 PID 1692 wrote to memory of 2408 1692 cmd.exe 53 PID 1692 wrote to memory of 2408 1692 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe"C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\tewAoIoQ\AgcgEYkk.exe"C:\Users\Admin\tewAoIoQ\AgcgEYkk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1104
-
-
C:\ProgramData\KKYAkwsc\fekwcIwc.exe"C:\ProgramData\KKYAkwsc\fekwcIwc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2312
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"2⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"4⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"6⤵PID:304
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"8⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"10⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"12⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"14⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"16⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"18⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"20⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"22⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"24⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"26⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"28⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"30⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"32⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"34⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"36⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"38⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"40⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"42⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff43⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"44⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff45⤵
- Suspicious behavior: EnumeratesProcesses
PID:800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"46⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"48⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"50⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"52⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"54⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"56⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"58⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"60⤵PID:352
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff61⤵
- Suspicious behavior: EnumeratesProcesses
PID:988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"62⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"64⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff65⤵PID:2900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"66⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff67⤵PID:2160
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"68⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff69⤵PID:1572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"70⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff71⤵PID:696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"72⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff73⤵PID:928
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"74⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff75⤵PID:2040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"76⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff77⤵PID:2600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"78⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff79⤵PID:288
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"80⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff81⤵PID:2528
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"82⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff83⤵PID:2692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"84⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff85⤵PID:1316
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"86⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff87⤵PID:1764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"88⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff89⤵PID:1536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"90⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff91⤵PID:2124
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"92⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff93⤵PID:1956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"94⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff95⤵PID:1568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"96⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff97⤵PID:2608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"98⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff99⤵PID:2068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"100⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff101⤵PID:2916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"102⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff103⤵PID:1568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"104⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff105⤵PID:1808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"106⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff107⤵PID:2808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"108⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff109⤵PID:3060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"110⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff111⤵PID:2948
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"112⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff113⤵PID:2200
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"114⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff115⤵PID:1512
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"116⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff117⤵PID:3024
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"118⤵PID:304
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff119⤵PID:2624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"120⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff121⤵PID:1192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"122⤵PID:2644
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-