Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
57f8e93f90b914bf567dcfa9bcd2ec60N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
57f8e93f90b914bf567dcfa9bcd2ec60N.exe
Resource
win10v2004-20240709-en
General
-
Target
57f8e93f90b914bf567dcfa9bcd2ec60N.exe
-
Size
119KB
-
MD5
57f8e93f90b914bf567dcfa9bcd2ec60
-
SHA1
3b9b8b264798d2b9c30f75e4aee9f2f88dc64d08
-
SHA256
b4820532b916dfef99ebaa74f940cd502ed9ee1e859571c0fb64437df509e628
-
SHA512
d8aebe8dc0fbc5c78b2024f274303b5502a3c50570406aa5959471d36dd5e7258ccb24345c48680ff6aebbb99e1a722709bd60692bcf0afb9f1cff1ad61e8624
-
SSDEEP
1536:dH+aignyGOf/+B4vnZ/pLh1as2LP5wOgfTy4LgJMkSO7FE2l6IUY1M29ndgY:dugOf/+BgV3asEROuQg+OEIL9gY
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (82) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation mosYkAYI.exe -
Executes dropped EXE 2 IoCs
pid Process 2148 mosYkAYI.exe 1152 VasIAkYY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mosYkAYI.exe = "C:\\Users\\Admin\\YeoEkgwQ\\mosYkAYI.exe" mosYkAYI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VasIAkYY.exe = "C:\\ProgramData\\jUcMQgQs\\VasIAkYY.exe" VasIAkYY.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mosYkAYI.exe = "C:\\Users\\Admin\\YeoEkgwQ\\mosYkAYI.exe" 57f8e93f90b914bf567dcfa9bcd2ec60N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VasIAkYY.exe = "C:\\ProgramData\\jUcMQgQs\\VasIAkYY.exe" 57f8e93f90b914bf567dcfa9bcd2ec60N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe mosYkAYI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1656 reg.exe 3516 reg.exe 3052 reg.exe 4888 reg.exe 3024 reg.exe 1808 reg.exe 3396 reg.exe 3016 reg.exe 764 reg.exe 1392 reg.exe 2268 reg.exe 1780 reg.exe 2232 reg.exe 1520 reg.exe 2500 reg.exe 3612 reg.exe 2332 reg.exe 2328 reg.exe 4664 reg.exe 4312 reg.exe 1228 reg.exe 1276 reg.exe 968 reg.exe 1844 reg.exe 4768 reg.exe 3532 reg.exe 1320 reg.exe 3020 reg.exe 1800 reg.exe 692 reg.exe 3788 reg.exe 4056 reg.exe 392 reg.exe 3888 reg.exe 4768 reg.exe 3380 reg.exe 2500 reg.exe 4132 reg.exe 932 reg.exe 5116 reg.exe 3788 reg.exe 2000 reg.exe 4556 reg.exe 3128 reg.exe 864 reg.exe 4564 reg.exe 1928 reg.exe 4680 reg.exe 4564 reg.exe 4264 reg.exe 5108 reg.exe 1136 reg.exe 4264 reg.exe 4004 reg.exe 3048 reg.exe 3164 reg.exe 2636 reg.exe 3932 reg.exe 4700 reg.exe 764 reg.exe 3364 reg.exe 4192 reg.exe 4836 reg.exe 2240 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 4436 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 4436 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 4436 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 4436 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 1584 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 1584 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 1584 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 1584 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 3816 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 3816 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 3816 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 3816 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 1508 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 1508 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 1508 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 1508 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 808 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 808 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 808 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 808 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 4320 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 4320 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 4320 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 4320 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 2812 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 2812 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 2812 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 2812 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 3332 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 3332 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 3332 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 3332 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 2480 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 2480 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 2480 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 2480 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 5020 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 5020 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 5020 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 5020 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 8 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 8 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 8 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 8 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 3228 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 3228 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 3228 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 3228 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 4528 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 4528 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 4528 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 4528 57f8e93f90b914bf567dcfa9bcd2ec60N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2148 mosYkAYI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe 2148 mosYkAYI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5096 wrote to memory of 2148 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 87 PID 5096 wrote to memory of 2148 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 87 PID 5096 wrote to memory of 2148 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 87 PID 5096 wrote to memory of 1152 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 88 PID 5096 wrote to memory of 1152 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 88 PID 5096 wrote to memory of 1152 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 88 PID 5096 wrote to memory of 1104 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 89 PID 5096 wrote to memory of 1104 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 89 PID 5096 wrote to memory of 1104 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 89 PID 1104 wrote to memory of 2896 1104 cmd.exe 91 PID 1104 wrote to memory of 2896 1104 cmd.exe 91 PID 1104 wrote to memory of 2896 1104 cmd.exe 91 PID 5096 wrote to memory of 5072 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 92 PID 5096 wrote to memory of 5072 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 92 PID 5096 wrote to memory of 5072 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 92 PID 5096 wrote to memory of 1780 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 93 PID 5096 wrote to memory of 1780 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 93 PID 5096 wrote to memory of 1780 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 93 PID 5096 wrote to memory of 1940 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 94 PID 5096 wrote to memory of 1940 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 94 PID 5096 wrote to memory of 1940 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 94 PID 5096 wrote to memory of 1028 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 95 PID 5096 wrote to memory of 1028 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 95 PID 5096 wrote to memory of 1028 5096 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 95 PID 1028 wrote to memory of 3184 1028 cmd.exe 100 PID 1028 wrote to memory of 3184 1028 cmd.exe 100 PID 1028 wrote to memory of 3184 1028 cmd.exe 100 PID 2896 wrote to memory of 4424 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 101 PID 2896 wrote to memory of 4424 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 101 PID 2896 wrote to memory of 4424 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 101 PID 4424 wrote to memory of 1860 4424 cmd.exe 103 PID 4424 wrote to memory of 1860 4424 cmd.exe 103 PID 4424 wrote to memory of 1860 4424 cmd.exe 103 PID 2896 wrote to memory of 1656 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 104 PID 2896 wrote to memory of 1656 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 104 PID 2896 wrote to memory of 1656 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 104 PID 2896 wrote to memory of 4476 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 105 PID 2896 wrote to memory of 4476 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 105 PID 2896 wrote to memory of 4476 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 105 PID 2896 wrote to memory of 1132 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 106 PID 2896 wrote to memory of 1132 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 106 PID 2896 wrote to memory of 1132 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 106 PID 2896 wrote to memory of 2156 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 107 PID 2896 wrote to memory of 2156 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 107 PID 2896 wrote to memory of 2156 2896 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 107 PID 2156 wrote to memory of 2532 2156 cmd.exe 112 PID 2156 wrote to memory of 2532 2156 cmd.exe 112 PID 2156 wrote to memory of 2532 2156 cmd.exe 112 PID 1860 wrote to memory of 2076 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 113 PID 1860 wrote to memory of 2076 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 113 PID 1860 wrote to memory of 2076 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 113 PID 2076 wrote to memory of 4436 2076 cmd.exe 115 PID 2076 wrote to memory of 4436 2076 cmd.exe 115 PID 2076 wrote to memory of 4436 2076 cmd.exe 115 PID 1860 wrote to memory of 1944 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 116 PID 1860 wrote to memory of 1944 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 116 PID 1860 wrote to memory of 1944 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 116 PID 1860 wrote to memory of 2900 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 117 PID 1860 wrote to memory of 2900 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 117 PID 1860 wrote to memory of 2900 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 117 PID 1860 wrote to memory of 1600 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 118 PID 1860 wrote to memory of 1600 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 118 PID 1860 wrote to memory of 1600 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 118 PID 1860 wrote to memory of 768 1860 57f8e93f90b914bf567dcfa9bcd2ec60N.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exe"C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\YeoEkgwQ\mosYkAYI.exe"C:\Users\Admin\YeoEkgwQ\mosYkAYI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2148
-
-
C:\ProgramData\jUcMQgQs\VasIAkYY.exe"C:\ProgramData\jUcMQgQs\VasIAkYY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"2⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"4⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"6⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"8⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"10⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"12⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"14⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N15⤵
- Suspicious behavior: EnumeratesProcesses
PID:808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"16⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"18⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"20⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"22⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"24⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N25⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"26⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N27⤵
- Suspicious behavior: EnumeratesProcesses
PID:8 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"28⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"30⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"32⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N33⤵PID:4992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"34⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N35⤵PID:3364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"36⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N37⤵PID:3312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"38⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N39⤵PID:2284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"40⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N41⤵PID:3096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"42⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N43⤵PID:1016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"44⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N45⤵PID:4712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"46⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N47⤵PID:3648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"48⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N49⤵PID:4756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"50⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N51⤵PID:4752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"52⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N53⤵PID:4536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"54⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N55⤵PID:4268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"56⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N57⤵PID:4564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"58⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N59⤵PID:1924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"60⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N61⤵PID:1392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"62⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N63⤵PID:4720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"64⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N65⤵PID:2700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"66⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N67⤵PID:3332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"68⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N69⤵PID:1256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"70⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N71⤵PID:1276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"72⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N73⤵PID:1508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"74⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N75⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"76⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N77⤵PID:3348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"78⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N79⤵PID:1860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"80⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N81⤵PID:2544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"82⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N83⤵PID:1508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"84⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N85⤵PID:4304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"86⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N87⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"88⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N89⤵PID:3096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"90⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N91⤵PID:2932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"92⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N93⤵PID:3324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"94⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N95⤵PID:4680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"96⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N97⤵PID:2480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"98⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N99⤵PID:392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"100⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N101⤵PID:4712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"102⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N103⤵PID:3960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"104⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N105⤵PID:264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"106⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N107⤵PID:3816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"108⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N109⤵PID:404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"110⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N111⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"112⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N113⤵PID:4056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"114⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N115⤵PID:3052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"116⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N117⤵PID:2760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"118⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N119⤵PID:4532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"120⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N.exeC:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N121⤵PID:3788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\57f8e93f90b914bf567dcfa9bcd2ec60N"122⤵PID:3044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-