Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe
Resource
win10v2004-20240704-en
General
-
Target
1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe
-
Size
111KB
-
MD5
ecd09b5545b83ee4679295a86c3cf64e
-
SHA1
3cd8e83e497f1bcffb67f97c5aa4929fc9e977bd
-
SHA256
1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf
-
SHA512
16f3081c9d077da9e88591d9cbdbceb853c25f978980cc0407aed3d6787632e831b56d5387b8090f84b612e15f1c33e671a7cba6f240c9e7ce58b7bc4c5b6e2f
-
SSDEEP
3072:irPItAetVb1OIzS8yYjiZr1/1z7rWbayiFMv3laXNqvhAkY:irQtAezH5yYjiZr1/1yzt9a3k
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (85) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation aQksIwQY.exe -
Executes dropped EXE 2 IoCs
pid Process 4852 CSkEQQUI.exe 5084 aQksIwQY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CSkEQQUI.exe = "C:\\Users\\Admin\\FwwcwswQ\\CSkEQQUI.exe" 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aQksIwQY.exe = "C:\\ProgramData\\BuwEMkMQ\\aQksIwQY.exe" 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aQksIwQY.exe = "C:\\ProgramData\\BuwEMkMQ\\aQksIwQY.exe" aQksIwQY.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CSkEQQUI.exe = "C:\\Users\\Admin\\FwwcwswQ\\CSkEQQUI.exe" CSkEQQUI.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe aQksIwQY.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe aQksIwQY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4920 reg.exe 1836 reg.exe 2408 reg.exe 2236 reg.exe 2608 reg.exe 920 reg.exe 4788 reg.exe 4440 reg.exe 3892 reg.exe 1448 reg.exe 1652 reg.exe 2972 reg.exe 4636 reg.exe 4360 reg.exe 2368 reg.exe 336 reg.exe 4312 reg.exe 3424 reg.exe 4116 reg.exe 1320 reg.exe 2424 reg.exe 1452 reg.exe 4712 reg.exe 640 reg.exe 3968 reg.exe 1824 reg.exe 4524 reg.exe 2172 reg.exe 2388 reg.exe 1596 reg.exe 548 reg.exe 4360 reg.exe 3752 reg.exe 3348 reg.exe 2868 reg.exe 1936 reg.exe 3496 reg.exe 1948 reg.exe 644 reg.exe 3192 reg.exe 3776 reg.exe 1080 reg.exe 1520 reg.exe 400 reg.exe 2288 reg.exe 2392 reg.exe 4164 reg.exe 4108 reg.exe 1400 reg.exe 1824 reg.exe 3996 reg.exe 1544 reg.exe 1184 reg.exe 3856 reg.exe 1320 reg.exe 892 reg.exe 3548 reg.exe 3000 reg.exe 4260 reg.exe 4788 reg.exe 4920 reg.exe 2288 reg.exe 4364 reg.exe 2388 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 892 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 892 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 892 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 892 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 556 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 556 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 556 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 556 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2892 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2892 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2892 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2892 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 4156 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 4156 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 4156 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 4156 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1556 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1556 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1556 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1556 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 3092 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 3092 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 3092 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 3092 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 5012 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 5012 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 5012 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 5012 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 644 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 644 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 644 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 644 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2372 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2372 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2372 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 2372 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1824 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1824 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1824 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1824 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 988 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 988 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 988 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 988 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1140 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1140 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1140 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 1140 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5084 aQksIwQY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe 5084 aQksIwQY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 4852 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 83 PID 3672 wrote to memory of 4852 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 83 PID 3672 wrote to memory of 4852 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 83 PID 3672 wrote to memory of 5084 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 84 PID 3672 wrote to memory of 5084 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 84 PID 3672 wrote to memory of 5084 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 84 PID 3672 wrote to memory of 3128 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 85 PID 3672 wrote to memory of 3128 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 85 PID 3672 wrote to memory of 3128 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 85 PID 3128 wrote to memory of 4652 3128 cmd.exe 87 PID 3128 wrote to memory of 4652 3128 cmd.exe 87 PID 3128 wrote to memory of 4652 3128 cmd.exe 87 PID 3672 wrote to memory of 2288 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 88 PID 3672 wrote to memory of 2288 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 88 PID 3672 wrote to memory of 2288 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 88 PID 3672 wrote to memory of 3428 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 89 PID 3672 wrote to memory of 3428 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 89 PID 3672 wrote to memory of 3428 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 89 PID 3672 wrote to memory of 2752 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 90 PID 3672 wrote to memory of 2752 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 90 PID 3672 wrote to memory of 2752 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 90 PID 3672 wrote to memory of 2672 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 91 PID 3672 wrote to memory of 2672 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 91 PID 3672 wrote to memory of 2672 3672 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 91 PID 2672 wrote to memory of 2156 2672 cmd.exe 97 PID 2672 wrote to memory of 2156 2672 cmd.exe 97 PID 2672 wrote to memory of 2156 2672 cmd.exe 97 PID 4652 wrote to memory of 3856 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 98 PID 4652 wrote to memory of 3856 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 98 PID 4652 wrote to memory of 3856 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 98 PID 3856 wrote to memory of 2564 3856 cmd.exe 100 PID 3856 wrote to memory of 2564 3856 cmd.exe 100 PID 3856 wrote to memory of 2564 3856 cmd.exe 100 PID 4652 wrote to memory of 368 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 101 PID 4652 wrote to memory of 368 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 101 PID 4652 wrote to memory of 368 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 101 PID 4652 wrote to memory of 2608 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 102 PID 4652 wrote to memory of 2608 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 102 PID 4652 wrote to memory of 2608 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 102 PID 4652 wrote to memory of 988 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 103 PID 4652 wrote to memory of 988 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 103 PID 4652 wrote to memory of 988 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 103 PID 4652 wrote to memory of 4336 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 104 PID 4652 wrote to memory of 4336 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 104 PID 4652 wrote to memory of 4336 4652 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 104 PID 4336 wrote to memory of 3996 4336 cmd.exe 109 PID 4336 wrote to memory of 3996 4336 cmd.exe 109 PID 4336 wrote to memory of 3996 4336 cmd.exe 109 PID 2564 wrote to memory of 4176 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 110 PID 2564 wrote to memory of 4176 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 110 PID 2564 wrote to memory of 4176 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 110 PID 4176 wrote to memory of 892 4176 cmd.exe 112 PID 4176 wrote to memory of 892 4176 cmd.exe 112 PID 4176 wrote to memory of 892 4176 cmd.exe 112 PID 2564 wrote to memory of 4400 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 113 PID 2564 wrote to memory of 4400 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 113 PID 2564 wrote to memory of 4400 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 113 PID 2564 wrote to memory of 2740 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 114 PID 2564 wrote to memory of 2740 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 114 PID 2564 wrote to memory of 2740 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 114 PID 2564 wrote to memory of 2436 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 115 PID 2564 wrote to memory of 2436 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 115 PID 2564 wrote to memory of 2436 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 115 PID 2564 wrote to memory of 2208 2564 1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe"C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\FwwcwswQ\CSkEQQUI.exe"C:\Users\Admin\FwwcwswQ\CSkEQQUI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4852
-
-
C:\ProgramData\BuwEMkMQ\aQksIwQY.exe"C:\ProgramData\BuwEMkMQ\aQksIwQY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:5084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"2⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"4⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"6⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf7⤵
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"8⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf9⤵
- Suspicious behavior: EnumeratesProcesses
PID:556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"10⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"12⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"14⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"16⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"18⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf19⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"20⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf21⤵
- Suspicious behavior: EnumeratesProcesses
PID:644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"22⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"24⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"26⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf27⤵
- Suspicious behavior: EnumeratesProcesses
PID:988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"28⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"30⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"32⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf33⤵PID:2860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"34⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf35⤵PID:2992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"36⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf37⤵PID:3680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"38⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf39⤵PID:3240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"40⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf41⤵PID:4412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"42⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf43⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"44⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf45⤵PID:4464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"46⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf47⤵PID:1616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"48⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf49⤵PID:4996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"50⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf51⤵PID:4272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"52⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf53⤵PID:1560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"54⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf55⤵PID:436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"56⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf57⤵PID:3628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"58⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf59⤵PID:2460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"60⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf61⤵PID:3264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"62⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf63⤵PID:2388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"64⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf65⤵PID:2564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"66⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf67⤵PID:4184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"68⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf69⤵PID:3788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"70⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf71⤵PID:440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"72⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf73⤵PID:4652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"74⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf75⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"76⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf77⤵PID:816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"78⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf79⤵PID:2056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"80⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf81⤵PID:3464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"82⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf83⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"84⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf85⤵PID:4288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"86⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf87⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"88⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf89⤵PID:1068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"90⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf91⤵PID:4528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"92⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf93⤵PID:1924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"94⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf95⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"96⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf97⤵PID:2992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"98⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf99⤵PID:5032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"100⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf101⤵PID:1888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"102⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf103⤵PID:744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"104⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf105⤵PID:4536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"106⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf107⤵PID:5068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"108⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf109⤵PID:3508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"110⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf111⤵PID:4840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"112⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf113⤵PID:2516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"114⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf115⤵PID:1796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"116⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf117⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"118⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf119⤵PID:428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"120⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf.exeC:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf121⤵PID:1300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1bf6dbbc0c685500e6f123ccddcc4bc5341885793ffface2959952f44598f4cf"122⤵PID:3816
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-