Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe
Resource
win10v2004-20240704-en
General
-
Target
1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe
-
Size
111KB
-
MD5
ecd09b5545b83ee4679295a86c3cf64e
-
SHA1
3cd8e83e497f1bcffb67f97c5aa4929fc9e977bd
-
SHA256
1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf
-
SHA512
16f3081c9d077da9e88591d9cbdbceb853c25f978980cc0407aed3d6787632e831b56d5387b8090f84b612e15f1c33e671a7cba6f240c9e7ce58b7bc4c5b6e2f
-
SSDEEP
3072:irPItAetVb1OIzS8yYjiZr1/1z7rWbayiFMv3laXNqvhAkY:irQtAezH5yYjiZr1/1yzt9a3k
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Control Panel\International\Geo\Nation SIUYUQYo.exe -
Executes dropped EXE 2 IoCs
pid Process 1016 AqEQcAwA.exe 2612 SIUYUQYo.exe -
Loads dropped DLL 20 IoCs
pid Process 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\AqEQcAwA.exe = "C:\\Users\\Admin\\BsosUsAw\\AqEQcAwA.exe" 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SIUYUQYo.exe = "C:\\ProgramData\\kQowogwc\\SIUYUQYo.exe" 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SIUYUQYo.exe = "C:\\ProgramData\\kQowogwc\\SIUYUQYo.exe" SIUYUQYo.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\AqEQcAwA.exe = "C:\\Users\\Admin\\BsosUsAw\\AqEQcAwA.exe" AqEQcAwA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2756 reg.exe 2604 reg.exe 2560 reg.exe 2008 reg.exe 2440 reg.exe 2788 reg.exe 2624 reg.exe 2828 reg.exe 996 reg.exe 288 reg.exe 1668 reg.exe 2900 reg.exe 1688 reg.exe 1276 reg.exe 1944 reg.exe 2016 reg.exe 1544 reg.exe 2112 reg.exe 320 reg.exe 1548 reg.exe 1752 reg.exe 1260 reg.exe 1572 reg.exe 2700 reg.exe 2920 reg.exe 1504 reg.exe 1580 reg.exe 2784 reg.exe 2696 reg.exe 296 reg.exe 2788 reg.exe 2792 reg.exe 1040 reg.exe 2724 reg.exe 1760 reg.exe 2008 reg.exe 1344 reg.exe 2244 reg.exe 2000 reg.exe 1312 reg.exe 1968 reg.exe 2984 reg.exe 900 reg.exe 1532 reg.exe 2884 reg.exe 996 reg.exe 1564 reg.exe 3032 reg.exe 1636 reg.exe 1908 reg.exe 2332 reg.exe 996 reg.exe 2768 reg.exe 2388 reg.exe 1316 reg.exe 2684 reg.exe 1564 reg.exe 2928 reg.exe 1780 reg.exe 2940 reg.exe 1564 reg.exe 2568 reg.exe 288 reg.exe 2456 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 3048 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 3048 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1976 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1976 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2804 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2804 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1904 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1904 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2940 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2940 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2896 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2896 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2736 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2736 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2752 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2752 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2020 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2020 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1584 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1584 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1768 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1768 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2536 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2536 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2984 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2984 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2928 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2928 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2020 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2020 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 628 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 628 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2648 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2648 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 340 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 340 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1084 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1084 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1904 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1904 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 496 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 496 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1788 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1788 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2628 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2628 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2444 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2444 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1092 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1092 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 920 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 920 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2036 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2036 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1812 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1812 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2768 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2768 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2612 SIUYUQYo.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe 2612 SIUYUQYo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1016 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 28 PID 2124 wrote to memory of 1016 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 28 PID 2124 wrote to memory of 1016 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 28 PID 2124 wrote to memory of 1016 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 28 PID 2124 wrote to memory of 2612 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 29 PID 2124 wrote to memory of 2612 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 29 PID 2124 wrote to memory of 2612 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 29 PID 2124 wrote to memory of 2612 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 29 PID 2124 wrote to memory of 2672 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 30 PID 2124 wrote to memory of 2672 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 30 PID 2124 wrote to memory of 2672 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 30 PID 2124 wrote to memory of 2672 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 30 PID 2672 wrote to memory of 2728 2672 cmd.exe 33 PID 2672 wrote to memory of 2728 2672 cmd.exe 33 PID 2672 wrote to memory of 2728 2672 cmd.exe 33 PID 2672 wrote to memory of 2728 2672 cmd.exe 33 PID 2124 wrote to memory of 2724 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 32 PID 2124 wrote to memory of 2724 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 32 PID 2124 wrote to memory of 2724 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 32 PID 2124 wrote to memory of 2724 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 32 PID 2124 wrote to memory of 2800 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 34 PID 2124 wrote to memory of 2800 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 34 PID 2124 wrote to memory of 2800 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 34 PID 2124 wrote to memory of 2800 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 34 PID 2124 wrote to memory of 2828 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 36 PID 2124 wrote to memory of 2828 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 36 PID 2124 wrote to memory of 2828 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 36 PID 2124 wrote to memory of 2828 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 36 PID 2124 wrote to memory of 2836 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 39 PID 2124 wrote to memory of 2836 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 39 PID 2124 wrote to memory of 2836 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 39 PID 2124 wrote to memory of 2836 2124 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 39 PID 2836 wrote to memory of 2644 2836 cmd.exe 41 PID 2836 wrote to memory of 2644 2836 cmd.exe 41 PID 2836 wrote to memory of 2644 2836 cmd.exe 41 PID 2836 wrote to memory of 2644 2836 cmd.exe 41 PID 2728 wrote to memory of 2996 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 42 PID 2728 wrote to memory of 2996 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 42 PID 2728 wrote to memory of 2996 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 42 PID 2728 wrote to memory of 2996 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 42 PID 2996 wrote to memory of 3048 2996 cmd.exe 44 PID 2996 wrote to memory of 3048 2996 cmd.exe 44 PID 2996 wrote to memory of 3048 2996 cmd.exe 44 PID 2996 wrote to memory of 3048 2996 cmd.exe 44 PID 2728 wrote to memory of 1592 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 45 PID 2728 wrote to memory of 1592 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 45 PID 2728 wrote to memory of 1592 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 45 PID 2728 wrote to memory of 1592 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 45 PID 2728 wrote to memory of 2856 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 46 PID 2728 wrote to memory of 2856 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 46 PID 2728 wrote to memory of 2856 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 46 PID 2728 wrote to memory of 2856 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 46 PID 2728 wrote to memory of 2876 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 48 PID 2728 wrote to memory of 2876 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 48 PID 2728 wrote to memory of 2876 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 48 PID 2728 wrote to memory of 2876 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 48 PID 2728 wrote to memory of 2988 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 50 PID 2728 wrote to memory of 2988 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 50 PID 2728 wrote to memory of 2988 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 50 PID 2728 wrote to memory of 2988 2728 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 50 PID 2988 wrote to memory of 900 2988 cmd.exe 53 PID 2988 wrote to memory of 900 2988 cmd.exe 53 PID 2988 wrote to memory of 900 2988 cmd.exe 53 PID 2988 wrote to memory of 900 2988 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe"C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\BsosUsAw\AqEQcAwA.exe"C:\Users\Admin\BsosUsAw\AqEQcAwA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1016
-
-
C:\ProgramData\kQowogwc\SIUYUQYo.exe"C:\ProgramData\kQowogwc\SIUYUQYo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2612
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"2⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"4⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"6⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"8⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"10⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"12⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"14⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"16⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"18⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"20⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"22⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"24⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"26⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"28⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"30⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"32⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"34⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"36⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf37⤵
- Suspicious behavior: EnumeratesProcesses
PID:628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"38⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"40⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf41⤵
- Suspicious behavior: EnumeratesProcesses
PID:340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"42⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"44⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"46⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf47⤵
- Suspicious behavior: EnumeratesProcesses
PID:496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"48⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"50⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"52⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"54⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"56⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf57⤵
- Suspicious behavior: EnumeratesProcesses
PID:920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"58⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"60⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"62⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"64⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf65⤵PID:1312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"66⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf67⤵PID:2068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"68⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf69⤵PID:1788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"70⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf71⤵PID:2500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"72⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf73⤵PID:2848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"74⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf75⤵PID:2820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"76⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf77⤵PID:1564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"78⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf79⤵PID:2900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"80⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf81⤵PID:2564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"82⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf83⤵PID:2452
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"84⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf85⤵PID:2704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"86⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf87⤵PID:1240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"88⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf89⤵PID:2388
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"90⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf91⤵PID:1580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"92⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf93⤵PID:2872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"94⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf95⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"96⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf97⤵PID:752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"98⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf99⤵PID:1520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"100⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf101⤵PID:2176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"102⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf103⤵PID:1152
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"104⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf105⤵PID:2384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"106⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf107⤵PID:2256
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"108⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf109⤵PID:1532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"110⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf111⤵PID:1320
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"112⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf113⤵PID:1944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"114⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf115⤵PID:2636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"116⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf117⤵PID:1256
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"118⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf119⤵PID:2732
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"120⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf121⤵PID:1812
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"122⤵PID:1600
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-