Analysis
-
max time kernel
120s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
6ae9dab15a474f3c8ac461ab1fa98850N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6ae9dab15a474f3c8ac461ab1fa98850N.exe
Resource
win10v2004-20240704-en
General
-
Target
6ae9dab15a474f3c8ac461ab1fa98850N.exe
-
Size
193KB
-
MD5
6ae9dab15a474f3c8ac461ab1fa98850
-
SHA1
4771c9592db2ca57a0dba94991f81776937931db
-
SHA256
7023408399880d66ba72cb7767d3521e17eb88915060d15d14ec00a4cbe37abb
-
SHA512
d390e89ea58ced5ac8efab1650b79e098715dc094613ff4d8db2211f8e192822a8850e0b976d8de9f2d5408fdb5d17aa3a8e71e407232e09165b5406ee87b2a3
-
SSDEEP
3072:Az9xsZBS4MpnnWzxJsaxsugXcB/Xxan52lyy2iP2YJgggggggggb6oSO:Az9sBSNn3aCugMB/ha5y2iPa6f
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (62) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Control Panel\International\Geo\Nation PcckwMgM.exe -
Executes dropped EXE 2 IoCs
pid Process 2592 rUsckokI.exe 2460 PcckwMgM.exe -
Loads dropped DLL 20 IoCs
pid Process 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\rUsckokI.exe = "C:\\Users\\Admin\\HIAMQAMg\\rUsckokI.exe" 6ae9dab15a474f3c8ac461ab1fa98850N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PcckwMgM.exe = "C:\\ProgramData\\eEIcIkYU\\PcckwMgM.exe" 6ae9dab15a474f3c8ac461ab1fa98850N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PcckwMgM.exe = "C:\\ProgramData\\eEIcIkYU\\PcckwMgM.exe" PcckwMgM.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\rUsckokI.exe = "C:\\Users\\Admin\\HIAMQAMg\\rUsckokI.exe" rUsckokI.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico PcckwMgM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2296 reg.exe 2872 reg.exe 1836 reg.exe 2840 reg.exe 316 reg.exe 2928 reg.exe 2824 reg.exe 892 reg.exe 2256 reg.exe 1260 reg.exe 1260 reg.exe 1944 reg.exe 2864 reg.exe 1944 reg.exe 1932 reg.exe 2760 reg.exe 2296 reg.exe 2128 reg.exe 2420 reg.exe 1712 reg.exe 2408 reg.exe 2336 reg.exe 1792 reg.exe 3032 reg.exe 964 reg.exe 1116 reg.exe 1528 reg.exe 328 reg.exe 3056 reg.exe 2536 reg.exe 2972 reg.exe 2784 reg.exe 1108 reg.exe 2220 reg.exe 2516 reg.exe 2724 reg.exe 1436 reg.exe 1396 reg.exe 2152 reg.exe 2756 reg.exe 2016 reg.exe 2444 reg.exe 1708 reg.exe 2240 reg.exe 2768 reg.exe 1168 reg.exe 1920 reg.exe 3036 reg.exe 896 reg.exe 1312 reg.exe 1124 reg.exe 2000 reg.exe 836 reg.exe 2936 reg.exe 2772 reg.exe 2516 reg.exe 2316 reg.exe 1052 reg.exe 2112 reg.exe 1128 reg.exe 836 reg.exe 2832 reg.exe 2032 reg.exe 1052 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1300 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1300 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1036 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1036 6ae9dab15a474f3c8ac461ab1fa98850N.exe 576 6ae9dab15a474f3c8ac461ab1fa98850N.exe 576 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2180 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2180 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2596 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2596 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2908 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2908 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2004 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2004 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1688 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1688 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1116 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1116 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2472 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2472 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2436 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2436 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2828 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2828 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1912 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1912 6ae9dab15a474f3c8ac461ab1fa98850N.exe 484 6ae9dab15a474f3c8ac461ab1fa98850N.exe 484 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1712 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1712 6ae9dab15a474f3c8ac461ab1fa98850N.exe 3036 6ae9dab15a474f3c8ac461ab1fa98850N.exe 3036 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2688 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2688 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2696 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2696 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2388 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2388 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1012 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1012 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2304 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2304 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2464 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2464 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2716 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2716 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2256 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2256 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1652 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1652 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1512 6ae9dab15a474f3c8ac461ab1fa98850N.exe 1512 6ae9dab15a474f3c8ac461ab1fa98850N.exe 612 6ae9dab15a474f3c8ac461ab1fa98850N.exe 612 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2756 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2756 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2524 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2524 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2960 6ae9dab15a474f3c8ac461ab1fa98850N.exe 2960 6ae9dab15a474f3c8ac461ab1fa98850N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2460 PcckwMgM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe 2460 PcckwMgM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2592 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 30 PID 2504 wrote to memory of 2592 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 30 PID 2504 wrote to memory of 2592 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 30 PID 2504 wrote to memory of 2592 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 30 PID 2504 wrote to memory of 2460 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 31 PID 2504 wrote to memory of 2460 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 31 PID 2504 wrote to memory of 2460 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 31 PID 2504 wrote to memory of 2460 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 31 PID 2504 wrote to memory of 2808 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 32 PID 2504 wrote to memory of 2808 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 32 PID 2504 wrote to memory of 2808 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 32 PID 2504 wrote to memory of 2808 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 32 PID 2504 wrote to memory of 2860 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 34 PID 2504 wrote to memory of 2860 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 34 PID 2504 wrote to memory of 2860 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 34 PID 2504 wrote to memory of 2860 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 34 PID 2504 wrote to memory of 2872 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 35 PID 2504 wrote to memory of 2872 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 35 PID 2504 wrote to memory of 2872 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 35 PID 2504 wrote to memory of 2872 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 35 PID 2504 wrote to memory of 2908 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 36 PID 2504 wrote to memory of 2908 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 36 PID 2504 wrote to memory of 2908 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 36 PID 2504 wrote to memory of 2908 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 36 PID 2504 wrote to memory of 2500 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 37 PID 2504 wrote to memory of 2500 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 37 PID 2504 wrote to memory of 2500 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 37 PID 2504 wrote to memory of 2500 2504 6ae9dab15a474f3c8ac461ab1fa98850N.exe 37 PID 2808 wrote to memory of 2924 2808 cmd.exe 42 PID 2808 wrote to memory of 2924 2808 cmd.exe 42 PID 2808 wrote to memory of 2924 2808 cmd.exe 42 PID 2808 wrote to memory of 2924 2808 cmd.exe 42 PID 2500 wrote to memory of 2932 2500 cmd.exe 43 PID 2500 wrote to memory of 2932 2500 cmd.exe 43 PID 2500 wrote to memory of 2932 2500 cmd.exe 43 PID 2500 wrote to memory of 2932 2500 cmd.exe 43 PID 2924 wrote to memory of 2320 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 44 PID 2924 wrote to memory of 2320 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 44 PID 2924 wrote to memory of 2320 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 44 PID 2924 wrote to memory of 2320 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 44 PID 2320 wrote to memory of 1300 2320 cmd.exe 46 PID 2320 wrote to memory of 1300 2320 cmd.exe 46 PID 2320 wrote to memory of 1300 2320 cmd.exe 46 PID 2320 wrote to memory of 1300 2320 cmd.exe 46 PID 2924 wrote to memory of 2888 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 47 PID 2924 wrote to memory of 2888 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 47 PID 2924 wrote to memory of 2888 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 47 PID 2924 wrote to memory of 2888 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 47 PID 2924 wrote to memory of 676 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 48 PID 2924 wrote to memory of 676 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 48 PID 2924 wrote to memory of 676 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 48 PID 2924 wrote to memory of 676 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 48 PID 2924 wrote to memory of 2332 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 50 PID 2924 wrote to memory of 2332 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 50 PID 2924 wrote to memory of 2332 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 50 PID 2924 wrote to memory of 2332 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 50 PID 2924 wrote to memory of 2724 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 52 PID 2924 wrote to memory of 2724 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 52 PID 2924 wrote to memory of 2724 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 52 PID 2924 wrote to memory of 2724 2924 6ae9dab15a474f3c8ac461ab1fa98850N.exe 52 PID 2724 wrote to memory of 1620 2724 cmd.exe 55 PID 2724 wrote to memory of 1620 2724 cmd.exe 55 PID 2724 wrote to memory of 1620 2724 cmd.exe 55 PID 2724 wrote to memory of 1620 2724 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exe"C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\HIAMQAMg\rUsckokI.exe"C:\Users\Admin\HIAMQAMg\rUsckokI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2592
-
-
C:\ProgramData\eEIcIkYU\PcckwMgM.exe"C:\ProgramData\eEIcIkYU\PcckwMgM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2460
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"2⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"4⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"6⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"8⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N9⤵
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"10⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"12⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"14⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"16⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"18⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"20⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"22⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"24⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"26⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"28⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"30⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N31⤵
- Suspicious behavior: EnumeratesProcesses
PID:484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"32⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"34⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"36⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"38⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"40⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"42⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"44⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"46⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"48⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"50⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"52⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"54⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"56⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N57⤵
- Suspicious behavior: EnumeratesProcesses
PID:612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"58⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"60⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"62⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"64⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N65⤵PID:1848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"66⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N67⤵PID:2216
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"68⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N69⤵PID:2400
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"70⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N71⤵PID:2188
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"72⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N73⤵PID:1600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"74⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N75⤵PID:2312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"76⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N77⤵PID:2656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"78⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N79⤵PID:468
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"80⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N81⤵PID:1008
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"82⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N83⤵PID:1840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"84⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N85⤵PID:612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"86⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N87⤵PID:896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"88⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N89⤵PID:332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"90⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N91⤵PID:1844
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"92⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N93⤵PID:1124
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"94⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N95⤵PID:2464
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"96⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N97⤵PID:1344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"98⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N99⤵PID:1560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"100⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N101⤵PID:2568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"102⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N103⤵PID:2172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"104⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N105⤵PID:1860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"106⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N107⤵PID:2388
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"108⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N109⤵PID:1656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"110⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N111⤵PID:2732
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"112⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N113⤵PID:2656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"114⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N115⤵PID:2772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"116⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N117⤵PID:1244
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"118⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N119⤵PID:1684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"120⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N.exeC:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N121⤵PID:2852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\6ae9dab15a474f3c8ac461ab1fa98850N"122⤵PID:2500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-