Analysis
-
max time kernel
120s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
3b50210d61984bfae5bb86a578ddc490N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3b50210d61984bfae5bb86a578ddc490N.exe
Resource
win10v2004-20240802-en
General
-
Target
3b50210d61984bfae5bb86a578ddc490N.exe
-
Size
184KB
-
MD5
3b50210d61984bfae5bb86a578ddc490
-
SHA1
545f9a863fad86816b09509ab918f0564cf2028e
-
SHA256
c7e4f4b1440aff31bbb0ef410ca535375ece1a84f9485507363313369234b769
-
SHA512
96d9e984b9129de388c1b3b90fdf0c78d8782f254e31e0a8b07fa9388d2d75cfb89a248dc931f12424ea1827af527e1a8f10af2d2dd4143cd5ba2bb2a928d3f4
-
SSDEEP
3072:HGRf4w6gH9kEfvtXLDqjLjIPOSASb8hfoFop4TDCr0iGMrAACu:HGRQfgH9LJDqjvc44TDG0i3rfh
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (52) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Control Panel\International\Geo\Nation VKYUkcAE.exe -
Deletes itself 1 IoCs
pid Process 2784 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2828 kMsgcgME.exe 2556 VKYUkcAE.exe -
Loads dropped DLL 20 IoCs
pid Process 2652 3b50210d61984bfae5bb86a578ddc490N.exe 2652 3b50210d61984bfae5bb86a578ddc490N.exe 2652 3b50210d61984bfae5bb86a578ddc490N.exe 2652 3b50210d61984bfae5bb86a578ddc490N.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kMsgcgME.exe = "C:\\Users\\Admin\\kyUAkskg\\kMsgcgME.exe" 3b50210d61984bfae5bb86a578ddc490N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VKYUkcAE.exe = "C:\\ProgramData\\qUwoUkMg\\VKYUkcAE.exe" 3b50210d61984bfae5bb86a578ddc490N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VKYUkcAE.exe = "C:\\ProgramData\\qUwoUkMg\\VKYUkcAE.exe" VKYUkcAE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\kMsgcgME.exe = "C:\\Users\\Admin\\kyUAkskg\\kMsgcgME.exe" kMsgcgME.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico VKYUkcAE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b50210d61984bfae5bb86a578ddc490N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b50210d61984bfae5bb86a578ddc490N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b50210d61984bfae5bb86a578ddc490N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b50210d61984bfae5bb86a578ddc490N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b50210d61984bfae5bb86a578ddc490N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b50210d61984bfae5bb86a578ddc490N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b50210d61984bfae5bb86a578ddc490N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b50210d61984bfae5bb86a578ddc490N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1928 reg.exe 2664 reg.exe 2132 reg.exe 1556 reg.exe 2092 reg.exe 1616 reg.exe 2076 reg.exe 1336 reg.exe 2068 reg.exe 1880 reg.exe 1480 reg.exe 2704 reg.exe 2852 reg.exe 2080 reg.exe 1616 reg.exe 896 reg.exe 1460 reg.exe 2308 reg.exe 532 reg.exe 2520 reg.exe 2684 reg.exe 2384 reg.exe 2552 reg.exe 2848 reg.exe 2628 reg.exe 2664 reg.exe 476 reg.exe 2420 reg.exe 2612 reg.exe 2460 reg.exe 1160 reg.exe 2816 reg.exe 1532 reg.exe 3020 reg.exe 3036 reg.exe 1336 reg.exe 2876 reg.exe 2436 reg.exe 2708 reg.exe 2116 reg.exe 896 reg.exe 2376 reg.exe 1332 reg.exe 1700 reg.exe 1624 reg.exe 1380 reg.exe 348 reg.exe 2456 reg.exe 2508 reg.exe 2616 reg.exe 2184 reg.exe 2728 reg.exe 2240 reg.exe 2264 reg.exe 1848 reg.exe 1380 reg.exe 1912 reg.exe 2816 reg.exe 1300 reg.exe 2936 reg.exe 2496 reg.exe 1860 reg.exe 2708 reg.exe 2688 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2652 3b50210d61984bfae5bb86a578ddc490N.exe 2652 3b50210d61984bfae5bb86a578ddc490N.exe 3032 3b50210d61984bfae5bb86a578ddc490N.exe 3032 3b50210d61984bfae5bb86a578ddc490N.exe 2384 3b50210d61984bfae5bb86a578ddc490N.exe 2384 3b50210d61984bfae5bb86a578ddc490N.exe 1968 3b50210d61984bfae5bb86a578ddc490N.exe 1968 3b50210d61984bfae5bb86a578ddc490N.exe 3004 3b50210d61984bfae5bb86a578ddc490N.exe 3004 3b50210d61984bfae5bb86a578ddc490N.exe 1076 3b50210d61984bfae5bb86a578ddc490N.exe 1076 3b50210d61984bfae5bb86a578ddc490N.exe 2872 3b50210d61984bfae5bb86a578ddc490N.exe 2872 3b50210d61984bfae5bb86a578ddc490N.exe 2436 3b50210d61984bfae5bb86a578ddc490N.exe 2436 3b50210d61984bfae5bb86a578ddc490N.exe 2216 3b50210d61984bfae5bb86a578ddc490N.exe 2216 3b50210d61984bfae5bb86a578ddc490N.exe 2376 3b50210d61984bfae5bb86a578ddc490N.exe 2376 3b50210d61984bfae5bb86a578ddc490N.exe 3056 3b50210d61984bfae5bb86a578ddc490N.exe 3056 3b50210d61984bfae5bb86a578ddc490N.exe 1480 3b50210d61984bfae5bb86a578ddc490N.exe 1480 3b50210d61984bfae5bb86a578ddc490N.exe 576 3b50210d61984bfae5bb86a578ddc490N.exe 576 3b50210d61984bfae5bb86a578ddc490N.exe 2304 3b50210d61984bfae5bb86a578ddc490N.exe 2304 3b50210d61984bfae5bb86a578ddc490N.exe 1960 3b50210d61984bfae5bb86a578ddc490N.exe 1960 3b50210d61984bfae5bb86a578ddc490N.exe 2144 3b50210d61984bfae5bb86a578ddc490N.exe 2144 3b50210d61984bfae5bb86a578ddc490N.exe 2340 3b50210d61984bfae5bb86a578ddc490N.exe 2340 3b50210d61984bfae5bb86a578ddc490N.exe 1560 3b50210d61984bfae5bb86a578ddc490N.exe 1560 3b50210d61984bfae5bb86a578ddc490N.exe 2840 3b50210d61984bfae5bb86a578ddc490N.exe 2840 3b50210d61984bfae5bb86a578ddc490N.exe 1208 3b50210d61984bfae5bb86a578ddc490N.exe 1208 3b50210d61984bfae5bb86a578ddc490N.exe 2744 3b50210d61984bfae5bb86a578ddc490N.exe 2744 3b50210d61984bfae5bb86a578ddc490N.exe 2044 3b50210d61984bfae5bb86a578ddc490N.exe 2044 3b50210d61984bfae5bb86a578ddc490N.exe 892 3b50210d61984bfae5bb86a578ddc490N.exe 892 3b50210d61984bfae5bb86a578ddc490N.exe 1076 3b50210d61984bfae5bb86a578ddc490N.exe 1076 3b50210d61984bfae5bb86a578ddc490N.exe 2844 3b50210d61984bfae5bb86a578ddc490N.exe 2844 3b50210d61984bfae5bb86a578ddc490N.exe 2436 3b50210d61984bfae5bb86a578ddc490N.exe 2436 3b50210d61984bfae5bb86a578ddc490N.exe 1696 3b50210d61984bfae5bb86a578ddc490N.exe 1696 3b50210d61984bfae5bb86a578ddc490N.exe 1532 3b50210d61984bfae5bb86a578ddc490N.exe 1532 3b50210d61984bfae5bb86a578ddc490N.exe 348 3b50210d61984bfae5bb86a578ddc490N.exe 348 3b50210d61984bfae5bb86a578ddc490N.exe 1864 3b50210d61984bfae5bb86a578ddc490N.exe 1864 3b50210d61984bfae5bb86a578ddc490N.exe 2728 3b50210d61984bfae5bb86a578ddc490N.exe 2728 3b50210d61984bfae5bb86a578ddc490N.exe 532 3b50210d61984bfae5bb86a578ddc490N.exe 532 3b50210d61984bfae5bb86a578ddc490N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2556 VKYUkcAE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe 2556 VKYUkcAE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2828 2652 3b50210d61984bfae5bb86a578ddc490N.exe 30 PID 2652 wrote to memory of 2828 2652 3b50210d61984bfae5bb86a578ddc490N.exe 30 PID 2652 wrote to memory of 2828 2652 3b50210d61984bfae5bb86a578ddc490N.exe 30 PID 2652 wrote to memory of 2828 2652 3b50210d61984bfae5bb86a578ddc490N.exe 30 PID 2652 wrote to memory of 2556 2652 3b50210d61984bfae5bb86a578ddc490N.exe 31 PID 2652 wrote to memory of 2556 2652 3b50210d61984bfae5bb86a578ddc490N.exe 31 PID 2652 wrote to memory of 2556 2652 3b50210d61984bfae5bb86a578ddc490N.exe 31 PID 2652 wrote to memory of 2556 2652 3b50210d61984bfae5bb86a578ddc490N.exe 31 PID 2652 wrote to memory of 2576 2652 3b50210d61984bfae5bb86a578ddc490N.exe 32 PID 2652 wrote to memory of 2576 2652 3b50210d61984bfae5bb86a578ddc490N.exe 32 PID 2652 wrote to memory of 2576 2652 3b50210d61984bfae5bb86a578ddc490N.exe 32 PID 2652 wrote to memory of 2576 2652 3b50210d61984bfae5bb86a578ddc490N.exe 32 PID 2652 wrote to memory of 2164 2652 3b50210d61984bfae5bb86a578ddc490N.exe 33 PID 2652 wrote to memory of 2164 2652 3b50210d61984bfae5bb86a578ddc490N.exe 33 PID 2652 wrote to memory of 2164 2652 3b50210d61984bfae5bb86a578ddc490N.exe 33 PID 2652 wrote to memory of 2164 2652 3b50210d61984bfae5bb86a578ddc490N.exe 33 PID 2652 wrote to memory of 2720 2652 3b50210d61984bfae5bb86a578ddc490N.exe 34 PID 2652 wrote to memory of 2720 2652 3b50210d61984bfae5bb86a578ddc490N.exe 34 PID 2652 wrote to memory of 2720 2652 3b50210d61984bfae5bb86a578ddc490N.exe 34 PID 2652 wrote to memory of 2720 2652 3b50210d61984bfae5bb86a578ddc490N.exe 34 PID 2652 wrote to memory of 2684 2652 3b50210d61984bfae5bb86a578ddc490N.exe 35 PID 2652 wrote to memory of 2684 2652 3b50210d61984bfae5bb86a578ddc490N.exe 35 PID 2652 wrote to memory of 2684 2652 3b50210d61984bfae5bb86a578ddc490N.exe 35 PID 2652 wrote to memory of 2684 2652 3b50210d61984bfae5bb86a578ddc490N.exe 35 PID 2652 wrote to memory of 2544 2652 3b50210d61984bfae5bb86a578ddc490N.exe 36 PID 2652 wrote to memory of 2544 2652 3b50210d61984bfae5bb86a578ddc490N.exe 36 PID 2652 wrote to memory of 2544 2652 3b50210d61984bfae5bb86a578ddc490N.exe 36 PID 2652 wrote to memory of 2544 2652 3b50210d61984bfae5bb86a578ddc490N.exe 36 PID 2576 wrote to memory of 3032 2576 cmd.exe 42 PID 2576 wrote to memory of 3032 2576 cmd.exe 42 PID 2576 wrote to memory of 3032 2576 cmd.exe 42 PID 2576 wrote to memory of 3032 2576 cmd.exe 42 PID 2544 wrote to memory of 1148 2544 cmd.exe 43 PID 2544 wrote to memory of 1148 2544 cmd.exe 43 PID 2544 wrote to memory of 1148 2544 cmd.exe 43 PID 2544 wrote to memory of 1148 2544 cmd.exe 43 PID 3032 wrote to memory of 2956 3032 3b50210d61984bfae5bb86a578ddc490N.exe 44 PID 3032 wrote to memory of 2956 3032 3b50210d61984bfae5bb86a578ddc490N.exe 44 PID 3032 wrote to memory of 2956 3032 3b50210d61984bfae5bb86a578ddc490N.exe 44 PID 3032 wrote to memory of 2956 3032 3b50210d61984bfae5bb86a578ddc490N.exe 44 PID 2956 wrote to memory of 2384 2956 cmd.exe 46 PID 2956 wrote to memory of 2384 2956 cmd.exe 46 PID 2956 wrote to memory of 2384 2956 cmd.exe 46 PID 2956 wrote to memory of 2384 2956 cmd.exe 46 PID 3032 wrote to memory of 1132 3032 3b50210d61984bfae5bb86a578ddc490N.exe 47 PID 3032 wrote to memory of 1132 3032 3b50210d61984bfae5bb86a578ddc490N.exe 47 PID 3032 wrote to memory of 1132 3032 3b50210d61984bfae5bb86a578ddc490N.exe 47 PID 3032 wrote to memory of 1132 3032 3b50210d61984bfae5bb86a578ddc490N.exe 47 PID 3032 wrote to memory of 2216 3032 3b50210d61984bfae5bb86a578ddc490N.exe 48 PID 3032 wrote to memory of 2216 3032 3b50210d61984bfae5bb86a578ddc490N.exe 48 PID 3032 wrote to memory of 2216 3032 3b50210d61984bfae5bb86a578ddc490N.exe 48 PID 3032 wrote to memory of 2216 3032 3b50210d61984bfae5bb86a578ddc490N.exe 48 PID 3032 wrote to memory of 316 3032 3b50210d61984bfae5bb86a578ddc490N.exe 50 PID 3032 wrote to memory of 316 3032 3b50210d61984bfae5bb86a578ddc490N.exe 50 PID 3032 wrote to memory of 316 3032 3b50210d61984bfae5bb86a578ddc490N.exe 50 PID 3032 wrote to memory of 316 3032 3b50210d61984bfae5bb86a578ddc490N.exe 50 PID 3032 wrote to memory of 2452 3032 3b50210d61984bfae5bb86a578ddc490N.exe 51 PID 3032 wrote to memory of 2452 3032 3b50210d61984bfae5bb86a578ddc490N.exe 51 PID 3032 wrote to memory of 2452 3032 3b50210d61984bfae5bb86a578ddc490N.exe 51 PID 3032 wrote to memory of 2452 3032 3b50210d61984bfae5bb86a578ddc490N.exe 51 PID 2452 wrote to memory of 2104 2452 cmd.exe 55 PID 2452 wrote to memory of 2104 2452 cmd.exe 55 PID 2452 wrote to memory of 2104 2452 cmd.exe 55 PID 2452 wrote to memory of 2104 2452 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exe"C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\kyUAkskg\kMsgcgME.exe"C:\Users\Admin\kyUAkskg\kMsgcgME.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2828
-
-
C:\ProgramData\qUwoUkMg\VKYUkcAE.exe"C:\ProgramData\qUwoUkMg\VKYUkcAE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2556
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"2⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"4⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"6⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"8⤵
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"10⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"12⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"14⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N15⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"16⤵
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"18⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"20⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"22⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"24⤵
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N25⤵
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"26⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N27⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"28⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"30⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"32⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"34⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"36⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"38⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"40⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"42⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"44⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N45⤵
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"46⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"48⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"50⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"52⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"54⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"56⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N57⤵
- Suspicious behavior: EnumeratesProcesses
PID:348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"58⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"60⤵
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"62⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N63⤵
- Suspicious behavior: EnumeratesProcesses
PID:532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"64⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N65⤵PID:2984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"66⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N67⤵PID:2512
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"68⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N69⤵PID:1720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"70⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N71⤵
- System Location Discovery: System Language Discovery
PID:348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"72⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N73⤵PID:2452
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"74⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N75⤵PID:1872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"76⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N77⤵PID:2240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"78⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N79⤵PID:2652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"80⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N81⤵PID:2396
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"82⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N83⤵PID:2068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"84⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N85⤵
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"86⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N87⤵PID:2988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"88⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N89⤵PID:600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"90⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N91⤵PID:1692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"92⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N93⤵PID:2244
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"94⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N95⤵PID:1912
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"96⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N97⤵PID:2936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"98⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N99⤵PID:3004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"100⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N101⤵PID:576
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"102⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N103⤵
- System Location Discovery: System Language Discovery
PID:1160 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"104⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N105⤵PID:1132
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"106⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N107⤵PID:2224
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"108⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N109⤵PID:2952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"110⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N111⤵
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"112⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N113⤵PID:2692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"114⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N115⤵PID:1076
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"116⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N117⤵PID:1160
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"118⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N119⤵PID:2244
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"120⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N.exeC:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N121⤵PID:340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3b50210d61984bfae5bb86a578ddc490N"122⤵PID:3064
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-