Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe
Resource
win10v2004-20240802-en
General
-
Target
6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe
-
Size
116KB
-
MD5
1bbc0b2d05e142a54b1174e4faf1cc02
-
SHA1
9c3ab35422d4a9a684fc31917889a31487396cc2
-
SHA256
6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad
-
SHA512
957abdc5d1b0c2595f0e7f74ae76eca0e7b04997e33eb8623904976c247a98de2e0c015eedf9b7b40939b5e8dc7ff1da9a069b1bd86cc0d76a4e0f332bf76da5
-
SSDEEP
3072:64JwqCUE0YsSc0o0QE5aTtbcfI9YIoNEs3Nlh8v9wsXV:6Iw5B0YK0o0QEkTtbcfI9YdEs3Dhmw
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation nykMoscM.exe -
Executes dropped EXE 2 IoCs
pid Process 4148 nykMoscM.exe 4724 nwIIQcAc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nwIIQcAc.exe = "C:\\ProgramData\\TOMEwQUc\\nwIIQcAc.exe" nwIIQcAc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nykMoscM.exe = "C:\\Users\\Admin\\TSQUscks\\nykMoscM.exe" 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nwIIQcAc.exe = "C:\\ProgramData\\TOMEwQUc\\nwIIQcAc.exe" 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nykMoscM.exe = "C:\\Users\\Admin\\TSQUscks\\nykMoscM.exe" nykMoscM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 4732 reg.exe 2824 reg.exe 2856 reg.exe 812 reg.exe 1824 reg.exe 952 reg.exe 264 reg.exe 4632 reg.exe 372 reg.exe 1820 reg.exe 1904 reg.exe 2488 reg.exe 4980 reg.exe 952 reg.exe 1656 reg.exe 4884 reg.exe 2488 reg.exe 2692 reg.exe 3084 reg.exe 1868 reg.exe 624 reg.exe 4272 reg.exe 932 reg.exe 4060 reg.exe 3512 reg.exe 880 reg.exe 5020 reg.exe 1336 reg.exe 1576 reg.exe 1624 reg.exe 1584 reg.exe 4764 reg.exe 4728 reg.exe 4036 reg.exe 1748 reg.exe 3652 reg.exe 2440 reg.exe 4980 reg.exe 1636 reg.exe 2464 reg.exe 1564 reg.exe 3808 reg.exe 4316 reg.exe 4472 reg.exe 3700 reg.exe 2888 reg.exe 3772 reg.exe 3956 reg.exe 456 reg.exe 400 reg.exe 812 reg.exe 4256 reg.exe 324 reg.exe 2676 reg.exe 3752 reg.exe 1952 reg.exe 3052 reg.exe 64 reg.exe 4412 reg.exe 2824 reg.exe 4272 reg.exe 2532 reg.exe 3312 reg.exe 1400 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4848 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4848 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4848 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4848 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 2124 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 2124 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 2124 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 2124 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 2996 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 2996 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 2996 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 2996 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4276 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4276 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4276 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4276 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4576 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4576 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4576 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4576 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4592 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4592 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4592 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4592 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 5076 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 5076 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 5076 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 5076 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4032 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4032 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4032 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 4032 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 1948 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 1948 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 1948 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 1948 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 3516 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 3516 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 3516 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 3516 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 3748 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 3748 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 3748 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 3748 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 1752 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 1752 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 1752 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 1752 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 2344 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 2344 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 2344 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 2344 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4148 nykMoscM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe 4148 nykMoscM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4780 wrote to memory of 4148 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 86 PID 4780 wrote to memory of 4148 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 86 PID 4780 wrote to memory of 4148 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 86 PID 4780 wrote to memory of 4724 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 87 PID 4780 wrote to memory of 4724 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 87 PID 4780 wrote to memory of 4724 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 87 PID 4780 wrote to memory of 2608 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 88 PID 4780 wrote to memory of 2608 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 88 PID 4780 wrote to memory of 2608 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 88 PID 2608 wrote to memory of 952 2608 cmd.exe 91 PID 2608 wrote to memory of 952 2608 cmd.exe 91 PID 2608 wrote to memory of 952 2608 cmd.exe 91 PID 4780 wrote to memory of 1868 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 90 PID 4780 wrote to memory of 1868 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 90 PID 4780 wrote to memory of 1868 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 90 PID 4780 wrote to memory of 1108 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 92 PID 4780 wrote to memory of 1108 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 92 PID 4780 wrote to memory of 1108 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 92 PID 4780 wrote to memory of 2676 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 93 PID 4780 wrote to memory of 2676 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 93 PID 4780 wrote to memory of 2676 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 93 PID 4780 wrote to memory of 1756 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 94 PID 4780 wrote to memory of 1756 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 94 PID 4780 wrote to memory of 1756 4780 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 94 PID 1756 wrote to memory of 3156 1756 cmd.exe 100 PID 1756 wrote to memory of 3156 1756 cmd.exe 100 PID 1756 wrote to memory of 3156 1756 cmd.exe 100 PID 952 wrote to memory of 3512 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 101 PID 952 wrote to memory of 3512 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 101 PID 952 wrote to memory of 3512 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 101 PID 3512 wrote to memory of 1196 3512 cmd.exe 103 PID 3512 wrote to memory of 1196 3512 cmd.exe 103 PID 3512 wrote to memory of 1196 3512 cmd.exe 103 PID 952 wrote to memory of 4032 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 104 PID 952 wrote to memory of 4032 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 104 PID 952 wrote to memory of 4032 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 104 PID 952 wrote to memory of 3372 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 105 PID 952 wrote to memory of 3372 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 105 PID 952 wrote to memory of 3372 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 105 PID 952 wrote to memory of 3300 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 106 PID 952 wrote to memory of 3300 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 106 PID 952 wrote to memory of 3300 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 106 PID 952 wrote to memory of 4436 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 107 PID 952 wrote to memory of 4436 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 107 PID 952 wrote to memory of 4436 952 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 107 PID 4436 wrote to memory of 1380 4436 cmd.exe 112 PID 4436 wrote to memory of 1380 4436 cmd.exe 112 PID 4436 wrote to memory of 1380 4436 cmd.exe 112 PID 1196 wrote to memory of 1540 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 113 PID 1196 wrote to memory of 1540 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 113 PID 1196 wrote to memory of 1540 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 113 PID 1540 wrote to memory of 4848 1540 cmd.exe 115 PID 1540 wrote to memory of 4848 1540 cmd.exe 115 PID 1540 wrote to memory of 4848 1540 cmd.exe 115 PID 1196 wrote to memory of 60 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 116 PID 1196 wrote to memory of 60 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 116 PID 1196 wrote to memory of 60 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 116 PID 1196 wrote to memory of 4964 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 117 PID 1196 wrote to memory of 4964 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 117 PID 1196 wrote to memory of 4964 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 117 PID 1196 wrote to memory of 1748 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 118 PID 1196 wrote to memory of 1748 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 118 PID 1196 wrote to memory of 1748 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 118 PID 1196 wrote to memory of 3732 1196 6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe"C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\TSQUscks\nykMoscM.exe"C:\Users\Admin\TSQUscks\nykMoscM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4148
-
-
C:\ProgramData\TOMEwQUc\nwIIQcAc.exe"C:\ProgramData\TOMEwQUc\nwIIQcAc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"2⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"4⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"6⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"8⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"10⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"12⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"14⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"16⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"18⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad19⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"20⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"22⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"24⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"26⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"28⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"30⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"32⤵
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad33⤵PID:4044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"34⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad35⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"36⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad37⤵PID:448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"38⤵PID:4796
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad39⤵PID:2488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"40⤵
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad41⤵PID:1400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"42⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad43⤵PID:840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"44⤵
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad45⤵PID:3836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"46⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad47⤵PID:1944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"48⤵
- System Location Discovery: System Language Discovery
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad49⤵PID:4044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"50⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad51⤵PID:3500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"52⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad53⤵PID:3480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"54⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad55⤵PID:548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"56⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad57⤵PID:2752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"58⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad59⤵PID:4640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"60⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad61⤵PID:432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"62⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad63⤵
- System Location Discovery: System Language Discovery
PID:896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"64⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad65⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"66⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad67⤵PID:1300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"68⤵PID:5080
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad69⤵PID:2632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"70⤵PID:4888
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad71⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"72⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad73⤵PID:2264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"74⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad75⤵PID:4232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"76⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad77⤵PID:2440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"78⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad79⤵PID:3156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"80⤵PID:2888
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad81⤵PID:4676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"82⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad83⤵PID:3480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"84⤵
- System Location Discovery: System Language Discovery
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad85⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"86⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad87⤵PID:1940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"88⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad89⤵PID:2060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"90⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad91⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"92⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad93⤵PID:3272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"94⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad95⤵
- System Location Discovery: System Language Discovery
PID:4336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"96⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad97⤵PID:2852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"98⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad99⤵PID:224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"100⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad101⤵PID:884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"102⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad103⤵PID:2908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"104⤵PID:2160
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad105⤵PID:5088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"106⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad107⤵PID:1932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"108⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad109⤵PID:3816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"110⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad111⤵PID:4764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"112⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad113⤵PID:532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"114⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad115⤵PID:2504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"116⤵PID:1756
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:996
-
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad117⤵PID:228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"118⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad119⤵PID:1624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"120⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad.exeC:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad121⤵PID:2908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad"122⤵PID:452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-