Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe
Resource
win10v2004-20240802-en
General
-
Target
a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe
-
Size
208KB
-
MD5
e8e50f8e8c3f7e7ec8a40eba7414b7ab
-
SHA1
69fd0c614bcd2616cddb7d8c98dd50aa82f744ae
-
SHA256
a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0
-
SHA512
6f8309c5de3b6f031587808c0c8bd9ae582fda9882edf4c50bd366b34b5359b625604f07ac9e67e0e7c4ecaa5158fe6e869faa81282d14db7953f178e661bfe9
-
SSDEEP
6144:nKgKrD7EJBNn4uQkKNLjnWYIKbkqu9aSN:nHi8BNn4uTKNPWYI1uk
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (79) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation aokMkgUA.exe -
Executes dropped EXE 2 IoCs
pid Process 4368 aokMkgUA.exe 4468 taoAUcgo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aokMkgUA.exe = "C:\\Users\\Admin\\AeYgUsAw\\aokMkgUA.exe" a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\taoAUcgo.exe = "C:\\ProgramData\\nOIcEwgY\\taoAUcgo.exe" a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aokMkgUA.exe = "C:\\Users\\Admin\\AeYgUsAw\\aokMkgUA.exe" aokMkgUA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\taoAUcgo.exe = "C:\\ProgramData\\nOIcEwgY\\taoAUcgo.exe" taoAUcgo.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe aokMkgUA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 608 Process not Found 2904 reg.exe 3572 reg.exe 364 reg.exe 968 reg.exe 4012 Process not Found 3136 reg.exe 3424 reg.exe 3752 reg.exe 4908 reg.exe 1132 Process not Found 4604 Process not Found 2132 reg.exe 5036 reg.exe 1188 reg.exe 4116 reg.exe 704 reg.exe 3364 reg.exe 3540 reg.exe 3448 reg.exe 2256 reg.exe 628 reg.exe 1300 reg.exe 1412 reg.exe 4460 reg.exe 2420 reg.exe 5052 reg.exe 3500 Process not Found 3276 Process not Found 400 reg.exe 2672 Process not Found 692 Process not Found 544 Process not Found 2524 reg.exe 3084 reg.exe 852 reg.exe 4272 reg.exe 5088 Process not Found 1132 reg.exe 4456 reg.exe 4308 reg.exe 4888 reg.exe 4688 Process not Found 4780 Process not Found 5052 reg.exe 1880 reg.exe 2036 reg.exe 372 reg.exe 3608 reg.exe 1104 reg.exe 3532 reg.exe 4224 reg.exe 2972 reg.exe 1696 reg.exe 2900 reg.exe 4868 reg.exe 3136 reg.exe 2908 reg.exe 1532 Process not Found 1316 reg.exe 3008 reg.exe 704 reg.exe 1652 reg.exe 3688 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4548 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4548 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4548 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4548 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 3768 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 3768 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 3768 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 3768 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 2984 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 2984 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 2984 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 2984 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 5052 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 5052 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 5052 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 5052 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 832 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 832 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 832 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 832 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4172 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4172 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4172 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4172 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 3508 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 3508 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 3508 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 3508 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 460 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 460 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 460 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 460 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 3112 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 3112 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 3112 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 3112 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4340 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4340 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4340 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4340 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 1660 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 1660 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 1660 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 1660 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4996 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4996 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4996 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4996 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4472 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4472 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4472 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 4472 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4368 aokMkgUA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe 4368 aokMkgUA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4488 wrote to memory of 4368 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 85 PID 4488 wrote to memory of 4368 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 85 PID 4488 wrote to memory of 4368 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 85 PID 4488 wrote to memory of 4468 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 86 PID 4488 wrote to memory of 4468 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 86 PID 4488 wrote to memory of 4468 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 86 PID 4488 wrote to memory of 2284 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 87 PID 4488 wrote to memory of 2284 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 87 PID 4488 wrote to memory of 2284 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 87 PID 2284 wrote to memory of 704 2284 cmd.exe 90 PID 2284 wrote to memory of 704 2284 cmd.exe 90 PID 2284 wrote to memory of 704 2284 cmd.exe 90 PID 4488 wrote to memory of 3016 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 91 PID 4488 wrote to memory of 3016 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 91 PID 4488 wrote to memory of 3016 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 91 PID 4488 wrote to memory of 2904 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 92 PID 4488 wrote to memory of 2904 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 92 PID 4488 wrote to memory of 2904 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 92 PID 4488 wrote to memory of 3976 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 93 PID 4488 wrote to memory of 3976 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 93 PID 4488 wrote to memory of 3976 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 93 PID 4488 wrote to memory of 4600 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 94 PID 4488 wrote to memory of 4600 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 94 PID 4488 wrote to memory of 4600 4488 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 94 PID 4600 wrote to memory of 3880 4600 cmd.exe 99 PID 4600 wrote to memory of 3880 4600 cmd.exe 99 PID 4600 wrote to memory of 3880 4600 cmd.exe 99 PID 704 wrote to memory of 3884 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 100 PID 704 wrote to memory of 3884 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 100 PID 704 wrote to memory of 3884 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 100 PID 3884 wrote to memory of 5000 3884 cmd.exe 102 PID 3884 wrote to memory of 5000 3884 cmd.exe 102 PID 3884 wrote to memory of 5000 3884 cmd.exe 102 PID 704 wrote to memory of 4296 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 103 PID 704 wrote to memory of 4296 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 103 PID 704 wrote to memory of 4296 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 103 PID 704 wrote to memory of 2916 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 104 PID 704 wrote to memory of 2916 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 104 PID 704 wrote to memory of 2916 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 104 PID 704 wrote to memory of 4476 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 105 PID 704 wrote to memory of 4476 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 105 PID 704 wrote to memory of 4476 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 105 PID 704 wrote to memory of 3752 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 106 PID 704 wrote to memory of 3752 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 106 PID 704 wrote to memory of 3752 704 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 106 PID 3752 wrote to memory of 4036 3752 cmd.exe 111 PID 3752 wrote to memory of 4036 3752 cmd.exe 111 PID 3752 wrote to memory of 4036 3752 cmd.exe 111 PID 5000 wrote to memory of 1516 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 112 PID 5000 wrote to memory of 1516 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 112 PID 5000 wrote to memory of 1516 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 112 PID 5000 wrote to memory of 2320 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 114 PID 5000 wrote to memory of 2320 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 114 PID 5000 wrote to memory of 2320 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 114 PID 5000 wrote to memory of 3932 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 115 PID 5000 wrote to memory of 3932 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 115 PID 5000 wrote to memory of 3932 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 115 PID 5000 wrote to memory of 1372 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 116 PID 5000 wrote to memory of 1372 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 116 PID 5000 wrote to memory of 1372 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 116 PID 5000 wrote to memory of 216 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 117 PID 5000 wrote to memory of 216 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 117 PID 5000 wrote to memory of 216 5000 a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe 117 PID 1516 wrote to memory of 4548 1516 cmd.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe"C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AeYgUsAw\aokMkgUA.exe"C:\Users\Admin\AeYgUsAw\aokMkgUA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4368
-
-
C:\ProgramData\nOIcEwgY\taoAUcgo.exe"C:\ProgramData\nOIcEwgY\taoAUcgo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"2⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d03⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"4⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d05⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"6⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d07⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"8⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d09⤵
- Suspicious behavior: EnumeratesProcesses
PID:3768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"10⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d011⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"12⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d013⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"14⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d015⤵
- Suspicious behavior: EnumeratesProcesses
PID:832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"16⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d017⤵
- Suspicious behavior: EnumeratesProcesses
PID:4172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"18⤵PID:508
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d019⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"20⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d021⤵
- Suspicious behavior: EnumeratesProcesses
PID:460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"22⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d023⤵
- Suspicious behavior: EnumeratesProcesses
PID:3112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"24⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d025⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"26⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d027⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"28⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d029⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"30⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d031⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"32⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d033⤵PID:5096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"34⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d035⤵PID:1256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"36⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d037⤵PID:4432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"38⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d039⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"40⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d041⤵PID:1880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"42⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d043⤵PID:312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"44⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d045⤵PID:2104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"46⤵PID:2024
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d047⤵PID:2884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"48⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d049⤵PID:3444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"50⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d051⤵PID:4460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"52⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d053⤵PID:4056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"54⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d055⤵PID:3828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"56⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d057⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"58⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d059⤵PID:2216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"60⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d061⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"62⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d063⤵PID:1596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"64⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d065⤵PID:3556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"66⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d067⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"68⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d069⤵PID:2428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"70⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d071⤵PID:400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"72⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d073⤵PID:4760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"74⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d075⤵PID:2956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"76⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d077⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"78⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d079⤵PID:2856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"80⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d081⤵PID:1852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"82⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d083⤵PID:4684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"84⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d085⤵PID:3380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"86⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d087⤵PID:624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"88⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d089⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"90⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d091⤵PID:4172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"92⤵PID:3364
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d093⤵PID:3928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"94⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d095⤵PID:1008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"96⤵
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d097⤵PID:5088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"98⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d099⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"100⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0101⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"102⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0103⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"104⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0105⤵PID:3932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"106⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0107⤵PID:4972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"108⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0109⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"110⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0111⤵PID:3364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"112⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0113⤵PID:4664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"114⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0115⤵PID:1760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"116⤵
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0117⤵PID:2120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"118⤵PID:1476
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0119⤵PID:2980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"120⤵
- System Location Discovery: System Language Discovery
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0.exeC:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0121⤵PID:3960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0"122⤵PID:3480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-