Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 23:54
Static task
static1
Behavioral task
behavioral1
Sample
62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe
Resource
win10v2004-20240508-en
General
-
Target
62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe
-
Size
208KB
-
MD5
67f8bc1f68d349d18faa2188d3cb4b07
-
SHA1
1a72055a7e2e602b11f7ed53aaaa7231240c89ee
-
SHA256
62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff
-
SHA512
ae6a720a7779af57ba3c0fb1b09f6d47a6f9dc8b64390846362627c5c304eccd4956e5d6ee5ca27d85522359c1d37fcc76227e8fb469f2de80802329f9cc8c36
-
SSDEEP
3072:we+nqymUiOlDoZImEKNsmN1+qONNbbKQkvuasNT+wadrttL9:8qy3iOlDoZxHvJMNfAvuh+wad7L9
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (81) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation MuAEsgUQ.exe -
Executes dropped EXE 2 IoCs
pid Process 4740 MuAEsgUQ.exe 2168 vWQUwgIw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MuAEsgUQ.exe = "C:\\Users\\Admin\\xEUAQkUA\\MuAEsgUQ.exe" 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vWQUwgIw.exe = "C:\\ProgramData\\GUUUIYoo\\vWQUwgIw.exe" 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MuAEsgUQ.exe = "C:\\Users\\Admin\\xEUAQkUA\\MuAEsgUQ.exe" MuAEsgUQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vWQUwgIw.exe = "C:\\ProgramData\\GUUUIYoo\\vWQUwgIw.exe" vWQUwgIw.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe MuAEsgUQ.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe MuAEsgUQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 748 Process not Found 4820 reg.exe 3700 reg.exe 3336 reg.exe 4460 reg.exe 4560 reg.exe 720 reg.exe 4580 reg.exe 3784 reg.exe 2892 reg.exe 1068 reg.exe 4364 reg.exe 3276 Process not Found 4948 reg.exe 2220 reg.exe 3024 Process not Found 2252 reg.exe 1612 reg.exe 4724 reg.exe 3884 reg.exe 1068 reg.exe 2248 reg.exe 2632 Process not Found 4084 Process not Found 1404 reg.exe 3276 Process not Found 2012 reg.exe 3492 reg.exe 3952 reg.exe 4848 reg.exe 1388 Process not Found 4284 reg.exe 1180 reg.exe 3868 reg.exe 1268 reg.exe 2580 reg.exe 4616 reg.exe 1064 reg.exe 2696 reg.exe 3952 reg.exe 3828 reg.exe 4816 Process not Found 3932 reg.exe 3004 reg.exe 2712 reg.exe 1996 reg.exe 2760 reg.exe 4748 reg.exe 2268 reg.exe 4012 Process not Found 3724 reg.exe 2768 reg.exe 3868 reg.exe 2408 reg.exe 1244 Process not Found 3444 reg.exe 2464 reg.exe 3828 reg.exe 3924 Process not Found 4616 reg.exe 2012 reg.exe 4616 reg.exe 3592 reg.exe 2768 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1612 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1612 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1612 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1612 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1140 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1140 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1140 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1140 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2348 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2348 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2348 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2348 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2188 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2188 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2188 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2188 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 468 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 468 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 468 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 468 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 3592 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 3592 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 3592 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 3592 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 748 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 748 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 748 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 748 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1892 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1892 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1892 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 1892 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2664 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2664 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2664 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 2664 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4604 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4604 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4604 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4604 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4436 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4436 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4436 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4436 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4956 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4956 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4956 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4956 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4888 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4888 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4888 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 4888 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4740 MuAEsgUQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe 4740 MuAEsgUQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 4740 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 90 PID 2760 wrote to memory of 4740 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 90 PID 2760 wrote to memory of 4740 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 90 PID 2760 wrote to memory of 2168 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 91 PID 2760 wrote to memory of 2168 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 91 PID 2760 wrote to memory of 2168 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 91 PID 2760 wrote to memory of 3240 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 92 PID 2760 wrote to memory of 3240 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 92 PID 2760 wrote to memory of 3240 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 92 PID 2760 wrote to memory of 4460 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 95 PID 2760 wrote to memory of 4460 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 95 PID 2760 wrote to memory of 4460 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 95 PID 3240 wrote to memory of 640 3240 cmd.exe 96 PID 3240 wrote to memory of 640 3240 cmd.exe 96 PID 3240 wrote to memory of 640 3240 cmd.exe 96 PID 2760 wrote to memory of 636 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 97 PID 2760 wrote to memory of 636 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 97 PID 2760 wrote to memory of 636 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 97 PID 2760 wrote to memory of 412 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 98 PID 2760 wrote to memory of 412 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 98 PID 2760 wrote to memory of 412 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 98 PID 2760 wrote to memory of 2384 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 99 PID 2760 wrote to memory of 2384 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 99 PID 2760 wrote to memory of 2384 2760 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 99 PID 2384 wrote to memory of 4900 2384 cmd.exe 104 PID 2384 wrote to memory of 4900 2384 cmd.exe 104 PID 2384 wrote to memory of 4900 2384 cmd.exe 104 PID 640 wrote to memory of 3636 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 105 PID 640 wrote to memory of 3636 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 105 PID 640 wrote to memory of 3636 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 105 PID 3636 wrote to memory of 1384 3636 cmd.exe 107 PID 3636 wrote to memory of 1384 3636 cmd.exe 107 PID 3636 wrote to memory of 1384 3636 cmd.exe 107 PID 640 wrote to memory of 720 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 108 PID 640 wrote to memory of 720 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 108 PID 640 wrote to memory of 720 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 108 PID 640 wrote to memory of 4284 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 109 PID 640 wrote to memory of 4284 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 109 PID 640 wrote to memory of 4284 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 109 PID 640 wrote to memory of 1236 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 110 PID 640 wrote to memory of 1236 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 110 PID 640 wrote to memory of 1236 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 110 PID 640 wrote to memory of 4280 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 111 PID 640 wrote to memory of 4280 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 111 PID 640 wrote to memory of 4280 640 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 111 PID 4280 wrote to memory of 1624 4280 cmd.exe 116 PID 4280 wrote to memory of 1624 4280 cmd.exe 116 PID 4280 wrote to memory of 1624 4280 cmd.exe 116 PID 1384 wrote to memory of 4432 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 118 PID 1384 wrote to memory of 4432 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 118 PID 1384 wrote to memory of 4432 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 118 PID 4432 wrote to memory of 1612 4432 cmd.exe 120 PID 4432 wrote to memory of 1612 4432 cmd.exe 120 PID 4432 wrote to memory of 1612 4432 cmd.exe 120 PID 1384 wrote to memory of 3760 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 121 PID 1384 wrote to memory of 3760 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 121 PID 1384 wrote to memory of 3760 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 121 PID 1384 wrote to memory of 5000 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 122 PID 1384 wrote to memory of 5000 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 122 PID 1384 wrote to memory of 5000 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 122 PID 1384 wrote to memory of 3620 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 123 PID 1384 wrote to memory of 3620 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 123 PID 1384 wrote to memory of 3620 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 123 PID 1384 wrote to memory of 2824 1384 62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe"C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\xEUAQkUA\MuAEsgUQ.exe"C:\Users\Admin\xEUAQkUA\MuAEsgUQ.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4740
-
-
C:\ProgramData\GUUUIYoo\vWQUwgIw.exe"C:\ProgramData\GUUUIYoo\vWQUwgIw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"2⤵
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"4⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"6⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"8⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"10⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"12⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"14⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff15⤵
- Suspicious behavior: EnumeratesProcesses
PID:468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"16⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"18⤵PID:4436
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV119⤵PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff19⤵
- Suspicious behavior: EnumeratesProcesses
PID:748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"20⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"22⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"24⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"26⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"28⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"30⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"32⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff33⤵PID:3724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"34⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff35⤵PID:3024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"36⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff37⤵PID:3740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"38⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff39⤵PID:4632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"40⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff41⤵PID:1652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"42⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff43⤵PID:4088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"44⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff45⤵PID:468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"46⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff47⤵PID:3024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"48⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff49⤵PID:1612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"50⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff51⤵PID:1192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"52⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff53⤵PID:4964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"54⤵PID:4468
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff55⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"56⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff57⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"58⤵PID:2580
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff59⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"60⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff61⤵PID:696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"62⤵PID:1200
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff63⤵PID:2020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"64⤵PID:3740
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV165⤵PID:1332
-
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff65⤵PID:864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"66⤵PID:1064
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff67⤵PID:4164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"68⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff69⤵PID:1604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"70⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff71⤵PID:1052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"72⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff73⤵PID:4396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"74⤵PID:4116
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff75⤵PID:4648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"76⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff77⤵PID:3256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"78⤵PID:772
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff79⤵PID:1344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"80⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff81⤵PID:316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"82⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff83⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"84⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff85⤵PID:4060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"86⤵PID:3928
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:388
-
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff87⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"88⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff89⤵PID:1784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"90⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff91⤵PID:2268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"92⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff93⤵PID:4928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"94⤵PID:3868
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff95⤵PID:4968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"96⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff97⤵PID:2364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"98⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff99⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"100⤵PID:376
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff101⤵PID:944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"102⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff103⤵PID:2012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"104⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff105⤵PID:4616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"106⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff107⤵PID:732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"108⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff109⤵PID:4888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"110⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff111⤵PID:748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"112⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff113⤵PID:4524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"114⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff115⤵PID:3968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"116⤵PID:1992
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff117⤵PID:2020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"118⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff119⤵PID:1068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"120⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff.exeC:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff121⤵PID:3028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff"122⤵PID:5028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-