Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe
Resource
win7-20240729-en
General
-
Target
fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe
-
Size
1006KB
-
MD5
2bfca009593c6b4be53979cf8d69023d
-
SHA1
0c019852533ee4d6f36dccdd6c0fca8070de2944
-
SHA256
fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592
-
SHA512
e361860ab966bfec775d2d6ac4482dfd39516ef39d3c8069ec79a8d60a83a74a0103af8515408a1f2ff16145dd157a28e89adff469d9e3e800d602ec3367b8c4
-
SSDEEP
24576:/LZgDe961iKogI4B92x5CRnSjOVOPU3SrJrQBC/1cokZzY:/LZgD91i2tcgnSjO5wdQZ0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\raskQgos\\WSsEAYow.exe," fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\raskQgos\\WSsEAYow.exe," fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\raskQgos\\WSsEAYow.exe,C:\\ProgramData\\MiYgwgwg\\xsYYEMwg.exe," fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\raskQgos\\WSsEAYow.exe,C:\\ProgramData\\MiYgwgwg\\xsYYEMwg.exe," fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation NUgkowgc.exe -
Executes dropped EXE 3 IoCs
pid Process 2304 NUgkowgc.exe 4828 WSsEAYow.exe 2332 oYIoAMEI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xGUkEkAQ.exe = "C:\\Users\\Admin\\hIosskYE\\xGUkEkAQ.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xsYYEMwg.exe = "C:\\ProgramData\\MiYgwgwg\\xsYYEMwg.exe" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NUgkowgc.exe = "C:\\Users\\Admin\\IkQMocwY\\NUgkowgc.exe" fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WSsEAYow.exe = "C:\\ProgramData\\raskQgos\\WSsEAYow.exe" fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xGUkEkAQ.exe = "C:\\Users\\Admin\\hIosskYE\\xGUkEkAQ.exe" fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xsYYEMwg.exe = "C:\\ProgramData\\MiYgwgwg\\xsYYEMwg.exe" fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WSsEAYow.exe = "C:\\ProgramData\\raskQgos\\WSsEAYow.exe" oYIoAMEI.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NUgkowgc.exe = "C:\\Users\\Admin\\IkQMocwY\\NUgkowgc.exe" NUgkowgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WSsEAYow.exe = "C:\\ProgramData\\raskQgos\\WSsEAYow.exe" WSsEAYow.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\IkQMocwY oYIoAMEI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\IkQMocwY\NUgkowgc oYIoAMEI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 3224 2676 WerFault.exe 83 4340 3804 WerFault.exe 92 5080 3508 WerFault.exe 108 1824 2204 WerFault.exe 120 1300 4780 WerFault.exe 127 220 4856 WerFault.exe 138 3860 3224 WerFault.exe 149 2400 3584 WerFault.exe 160 1132 3592 WerFault.exe 173 2036 3956 WerFault.exe 184 2192 2520 WerFault.exe 196 2372 3456 WerFault.exe 208 3980 4720 WerFault.exe 219 3928 4644 WerFault.exe 230 3976 3904 WerFault.exe 241 1772 4804 WerFault.exe 252 4968 2844 WerFault.exe 263 1736 4720 WerFault.exe 275 4852 4296 WerFault.exe 286 1892 3944 WerFault.exe 297 2520 2904 WerFault.exe 308 2788 4840 WerFault.exe 321 1388 3980 WerFault.exe 332 1684 4320 WerFault.exe 343 720 3944 WerFault.exe 354 3996 3176 WerFault.exe 365 5004 1860 WerFault.exe 376 4832 1376 WerFault.exe 387 556 3856 WerFault.exe 398 2124 4420 WerFault.exe 409 5044 4340 WerFault.exe 420 392 1844 WerFault.exe 431 2644 3956 WerFault.exe 442 448 3764 WerFault.exe 453 5080 2996 WerFault.exe 464 556 4316 WerFault.exe 475 1692 4188 WerFault.exe 486 2312 2904 WerFault.exe 497 4500 4132 WerFault.exe 508 1796 4860 WerFault.exe 519 4736 1480 WerFault.exe 530 1884 2124 WerFault.exe 541 3908 4572 WerFault.exe 552 1376 1568 WerFault.exe 563 2960 1492 WerFault.exe 574 3704 2592 WerFault.exe 585 4188 3144 WerFault.exe 597 2720 4744 WerFault.exe 608 1880 3168 WerFault.exe 619 1644 5072 WerFault.exe 631 4268 2192 WerFault.exe 642 1092 1884 WerFault.exe 653 3600 4964 WerFault.exe 665 4696 4312 WerFault.exe 676 4476 2604 WerFault.exe 687 3428 720 WerFault.exe 698 3524 4080 WerFault.exe 709 2844 1824 WerFault.exe 720 1004 4872 WerFault.exe 731 4964 2284 WerFault.exe 742 4268 3976 WerFault.exe 753 4896 4780 WerFault.exe 764 4824 3424 WerFault.exe 775 3668 640 WerFault.exe 786 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xGUkEkAQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1960 Process not Found 3668 reg.exe 3932 reg.exe 1960 reg.exe 4644 reg.exe 5056 reg.exe 4196 reg.exe 2380 reg.exe 3668 reg.exe 3080 reg.exe 3416 Process not Found 1824 reg.exe 2400 reg.exe 4784 reg.exe 1064 reg.exe 3612 Process not Found 1248 reg.exe 4472 reg.exe 4744 reg.exe 5084 reg.exe 5084 reg.exe 1796 Process not Found 2892 reg.exe 4696 reg.exe 1728 Process not Found 4564 reg.exe 1864 reg.exe 968 reg.exe 3128 reg.exe 4964 reg.exe 1144 reg.exe 1412 reg.exe 2288 reg.exe 556 reg.exe 1860 reg.exe 3484 reg.exe 3932 reg.exe 3684 reg.exe 1480 reg.exe 4792 reg.exe 776 reg.exe 2720 reg.exe 5008 reg.exe 4764 reg.exe 4268 reg.exe 2920 reg.exe 4268 reg.exe 3612 reg.exe 3428 reg.exe 324 reg.exe 2868 reg.exe 3620 reg.exe 2436 Process not Found 2904 Process not Found 2888 reg.exe 2676 reg.exe 2644 reg.exe 3764 reg.exe 3116 reg.exe 3780 reg.exe 2788 reg.exe 3520 reg.exe 1860 reg.exe 100 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4780 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4780 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4780 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4780 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4856 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4856 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4856 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4856 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3224 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3224 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3224 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3224 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3584 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3584 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3584 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3584 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3592 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3592 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3592 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3592 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3956 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3956 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3956 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3956 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2520 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2520 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2520 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 2520 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3456 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3456 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3456 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3456 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4720 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4720 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4720 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4720 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4644 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4644 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4644 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4644 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3904 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3904 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3904 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 3904 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 4804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2304 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 87 PID 2676 wrote to memory of 2304 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 87 PID 2676 wrote to memory of 2304 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 87 PID 2676 wrote to memory of 4828 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 88 PID 2676 wrote to memory of 4828 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 88 PID 2676 wrote to memory of 4828 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 88 PID 2676 wrote to memory of 3196 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 90 PID 2676 wrote to memory of 3196 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 90 PID 2676 wrote to memory of 3196 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 90 PID 3196 wrote to memory of 3804 3196 cmd.exe 92 PID 3196 wrote to memory of 3804 3196 cmd.exe 92 PID 3196 wrote to memory of 3804 3196 cmd.exe 92 PID 2676 wrote to memory of 4296 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 93 PID 2676 wrote to memory of 4296 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 93 PID 2676 wrote to memory of 4296 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 93 PID 2676 wrote to memory of 3192 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 94 PID 2676 wrote to memory of 3192 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 94 PID 2676 wrote to memory of 3192 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 94 PID 2676 wrote to memory of 4244 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 95 PID 2676 wrote to memory of 4244 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 95 PID 2676 wrote to memory of 4244 2676 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 95 PID 3804 wrote to memory of 2644 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 103 PID 3804 wrote to memory of 2644 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 103 PID 3804 wrote to memory of 2644 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 103 PID 3804 wrote to memory of 1860 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 105 PID 3804 wrote to memory of 1860 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 105 PID 3804 wrote to memory of 1860 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 105 PID 3804 wrote to memory of 3712 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 106 PID 3804 wrote to memory of 3712 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 106 PID 3804 wrote to memory of 3712 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 106 PID 3804 wrote to memory of 2844 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 107 PID 3804 wrote to memory of 2844 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 107 PID 3804 wrote to memory of 2844 3804 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 107 PID 2644 wrote to memory of 3508 2644 cmd.exe 108 PID 2644 wrote to memory of 3508 2644 cmd.exe 108 PID 2644 wrote to memory of 3508 2644 cmd.exe 108 PID 3508 wrote to memory of 1736 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 114 PID 3508 wrote to memory of 1736 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 114 PID 3508 wrote to memory of 1736 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 114 PID 3508 wrote to memory of 744 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 116 PID 3508 wrote to memory of 744 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 116 PID 3508 wrote to memory of 744 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 116 PID 3508 wrote to memory of 3980 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 117 PID 3508 wrote to memory of 3980 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 117 PID 3508 wrote to memory of 3980 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 117 PID 3508 wrote to memory of 516 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 118 PID 3508 wrote to memory of 516 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 118 PID 3508 wrote to memory of 516 3508 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 118 PID 1736 wrote to memory of 2204 1736 cmd.exe 120 PID 1736 wrote to memory of 2204 1736 cmd.exe 120 PID 1736 wrote to memory of 2204 1736 cmd.exe 120 PID 2204 wrote to memory of 4140 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 125 PID 2204 wrote to memory of 4140 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 125 PID 2204 wrote to memory of 4140 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 125 PID 4140 wrote to memory of 4780 4140 cmd.exe 127 PID 4140 wrote to memory of 4780 4140 cmd.exe 127 PID 4140 wrote to memory of 4780 4140 cmd.exe 127 PID 2204 wrote to memory of 3112 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 128 PID 2204 wrote to memory of 3112 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 128 PID 2204 wrote to memory of 3112 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 128 PID 2204 wrote to memory of 3156 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 129 PID 2204 wrote to memory of 3156 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 129 PID 2204 wrote to memory of 3156 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 129 PID 2204 wrote to memory of 4784 2204 fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe"C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\IkQMocwY\NUgkowgc.exe"C:\Users\Admin\IkQMocwY\NUgkowgc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:2304
-
-
C:\ProgramData\raskQgos\WSsEAYow.exe"C:\ProgramData\raskQgos\WSsEAYow.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"2⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd5923⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"4⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd5925⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"6⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd5927⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"8⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd5929⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"10⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59211⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"12⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59213⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"14⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59215⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"16⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59217⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"18⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59219⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"20⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59221⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"22⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59223⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"24⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59225⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"26⤵
- System Location Discovery: System Language Discovery
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59227⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"28⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59229⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"30⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59231⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"32⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59233⤵PID:2844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"34⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59235⤵PID:4720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"36⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59237⤵PID:4296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"38⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59239⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"40⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59241⤵PID:2904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"42⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59243⤵PID:4840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"44⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59245⤵PID:3980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"46⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59247⤵PID:4320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"48⤵
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59249⤵PID:3944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"50⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59251⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"52⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59253⤵PID:1860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"54⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59255⤵
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"56⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59257⤵PID:3856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"58⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59259⤵
- System Location Discovery: System Language Discovery
PID:4420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"60⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59261⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"62⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59263⤵PID:1844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"64⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59265⤵PID:3956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"66⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59267⤵PID:3764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"68⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59269⤵PID:2996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"70⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59271⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"72⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59273⤵PID:4188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"74⤵
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59275⤵PID:2904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"76⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59277⤵PID:4132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"78⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59279⤵PID:4860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"80⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59281⤵PID:1480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"82⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59283⤵PID:2124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"84⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59285⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"86⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59287⤵PID:1568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"88⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59289⤵
- System Location Discovery: System Language Discovery
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"90⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59291⤵PID:2592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"92⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59293⤵PID:3144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"94⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59295⤵PID:4744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"96⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59297⤵PID:3168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"98⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd59299⤵PID:5072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"100⤵
- System Location Discovery: System Language Discovery
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592101⤵PID:2192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"102⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592103⤵PID:1884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"104⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592105⤵PID:4964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"106⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592107⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"108⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592109⤵PID:2604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"110⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592111⤵PID:720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"112⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592113⤵PID:4080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"114⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592115⤵PID:1824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"116⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592117⤵PID:4872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"118⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592119⤵PID:2284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"120⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592.exeC:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592121⤵PID:3976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc65e05fb084c04524d23c52ba4951125943d1d109727c5f78e78b64d5cbd592"122⤵PID:3856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-