Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 17:54
Static task
static1
Behavioral task
behavioral1
Sample
8593471e2db25971f5519849555e6550N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8593471e2db25971f5519849555e6550N.exe
Resource
win10v2004-20240802-en
General
-
Target
8593471e2db25971f5519849555e6550N.exe
-
Size
201KB
-
MD5
8593471e2db25971f5519849555e6550
-
SHA1
f3a579a1fa3bc08637b6aac771625167eb663601
-
SHA256
7d6ee85156ce834c94f351810ac4a457bd7551be29fdc202e5b6c4abde9f7474
-
SHA512
dd031faf72e235afc618f346c530d99b4e259536bd059b26dd686060304c6eda0cc4066971b211ce67bc773f2457245a2695554e983b7ab3097cac9ff5a7cf0b
-
SSDEEP
6144:J1dpkFTr3x166z1pgOjQhx5ZH5l8biJ8ex1GSI7V2Jqe:dKRrz1pgOjQhx5ZH5l8biJ8ex1GhEAe
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (72) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation JSkYEcMw.exe -
Executes dropped EXE 2 IoCs
pid Process 896 pAcMggcw.exe 3088 JSkYEcMw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pAcMggcw.exe = "C:\\Users\\Admin\\eCEgMsQo\\pAcMggcw.exe" pAcMggcw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pAcMggcw.exe = "C:\\Users\\Admin\\eCEgMsQo\\pAcMggcw.exe" 8593471e2db25971f5519849555e6550N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JSkYEcMw.exe = "C:\\ProgramData\\SkUEYEkQ\\JSkYEcMw.exe" 8593471e2db25971f5519849555e6550N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JSkYEcMw.exe = "C:\\ProgramData\\SkUEYEkQ\\JSkYEcMw.exe" JSkYEcMw.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe JSkYEcMw.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe JSkYEcMw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8593471e2db25971f5519849555e6550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8593471e2db25971f5519849555e6550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8593471e2db25971f5519849555e6550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8593471e2db25971f5519849555e6550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8593471e2db25971f5519849555e6550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8593471e2db25971f5519849555e6550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8593471e2db25971f5519849555e6550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8593471e2db25971f5519849555e6550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8593471e2db25971f5519849555e6550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8593471e2db25971f5519849555e6550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 4472 reg.exe 1980 reg.exe 5052 reg.exe 4512 reg.exe 4956 reg.exe 3592 reg.exe 800 reg.exe 3820 reg.exe 1280 reg.exe 444 reg.exe 2464 reg.exe 3312 reg.exe 424 reg.exe 1372 reg.exe 1392 reg.exe 2100 reg.exe 4624 reg.exe 1196 reg.exe 2552 reg.exe 4772 reg.exe 2412 reg.exe 3372 reg.exe 1828 reg.exe 3616 reg.exe 3864 reg.exe 5012 reg.exe 2732 reg.exe 1296 reg.exe 1752 reg.exe 4500 reg.exe 4432 reg.exe 3848 reg.exe 1828 reg.exe 2120 reg.exe 4392 reg.exe 444 reg.exe 2400 reg.exe 2976 reg.exe 3576 reg.exe 4956 reg.exe 2892 reg.exe 4324 reg.exe 1916 reg.exe 3108 reg.exe 5012 reg.exe 4344 reg.exe 3888 reg.exe 3384 reg.exe 744 reg.exe 4296 reg.exe 1536 reg.exe 1300 reg.exe 3996 reg.exe 3000 reg.exe 744 reg.exe 1772 reg.exe 4624 reg.exe 4516 reg.exe 1028 reg.exe 4056 reg.exe 800 reg.exe 4936 reg.exe 4784 reg.exe 3312 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5040 8593471e2db25971f5519849555e6550N.exe 5040 8593471e2db25971f5519849555e6550N.exe 5040 8593471e2db25971f5519849555e6550N.exe 5040 8593471e2db25971f5519849555e6550N.exe 4124 8593471e2db25971f5519849555e6550N.exe 4124 8593471e2db25971f5519849555e6550N.exe 4124 8593471e2db25971f5519849555e6550N.exe 4124 8593471e2db25971f5519849555e6550N.exe 3108 8593471e2db25971f5519849555e6550N.exe 3108 8593471e2db25971f5519849555e6550N.exe 3108 8593471e2db25971f5519849555e6550N.exe 3108 8593471e2db25971f5519849555e6550N.exe 1752 8593471e2db25971f5519849555e6550N.exe 1752 8593471e2db25971f5519849555e6550N.exe 1752 8593471e2db25971f5519849555e6550N.exe 1752 8593471e2db25971f5519849555e6550N.exe 3084 8593471e2db25971f5519849555e6550N.exe 3084 8593471e2db25971f5519849555e6550N.exe 3084 8593471e2db25971f5519849555e6550N.exe 3084 8593471e2db25971f5519849555e6550N.exe 928 8593471e2db25971f5519849555e6550N.exe 928 8593471e2db25971f5519849555e6550N.exe 928 8593471e2db25971f5519849555e6550N.exe 928 8593471e2db25971f5519849555e6550N.exe 3868 8593471e2db25971f5519849555e6550N.exe 3868 8593471e2db25971f5519849555e6550N.exe 3868 8593471e2db25971f5519849555e6550N.exe 3868 8593471e2db25971f5519849555e6550N.exe 5104 8593471e2db25971f5519849555e6550N.exe 5104 8593471e2db25971f5519849555e6550N.exe 5104 8593471e2db25971f5519849555e6550N.exe 5104 8593471e2db25971f5519849555e6550N.exe 4396 8593471e2db25971f5519849555e6550N.exe 4396 8593471e2db25971f5519849555e6550N.exe 4396 8593471e2db25971f5519849555e6550N.exe 4396 8593471e2db25971f5519849555e6550N.exe 5008 8593471e2db25971f5519849555e6550N.exe 5008 8593471e2db25971f5519849555e6550N.exe 5008 8593471e2db25971f5519849555e6550N.exe 5008 8593471e2db25971f5519849555e6550N.exe 2636 8593471e2db25971f5519849555e6550N.exe 2636 8593471e2db25971f5519849555e6550N.exe 2636 8593471e2db25971f5519849555e6550N.exe 2636 8593471e2db25971f5519849555e6550N.exe 4708 8593471e2db25971f5519849555e6550N.exe 4708 8593471e2db25971f5519849555e6550N.exe 4708 8593471e2db25971f5519849555e6550N.exe 4708 8593471e2db25971f5519849555e6550N.exe 3108 8593471e2db25971f5519849555e6550N.exe 3108 8593471e2db25971f5519849555e6550N.exe 3108 8593471e2db25971f5519849555e6550N.exe 3108 8593471e2db25971f5519849555e6550N.exe 2464 8593471e2db25971f5519849555e6550N.exe 2464 8593471e2db25971f5519849555e6550N.exe 2464 8593471e2db25971f5519849555e6550N.exe 2464 8593471e2db25971f5519849555e6550N.exe 1640 8593471e2db25971f5519849555e6550N.exe 1640 8593471e2db25971f5519849555e6550N.exe 1640 8593471e2db25971f5519849555e6550N.exe 1640 8593471e2db25971f5519849555e6550N.exe 4796 8593471e2db25971f5519849555e6550N.exe 4796 8593471e2db25971f5519849555e6550N.exe 4796 8593471e2db25971f5519849555e6550N.exe 4796 8593471e2db25971f5519849555e6550N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3088 JSkYEcMw.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe 3088 JSkYEcMw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 896 5040 8593471e2db25971f5519849555e6550N.exe 86 PID 5040 wrote to memory of 896 5040 8593471e2db25971f5519849555e6550N.exe 86 PID 5040 wrote to memory of 896 5040 8593471e2db25971f5519849555e6550N.exe 86 PID 5040 wrote to memory of 3088 5040 8593471e2db25971f5519849555e6550N.exe 87 PID 5040 wrote to memory of 3088 5040 8593471e2db25971f5519849555e6550N.exe 87 PID 5040 wrote to memory of 3088 5040 8593471e2db25971f5519849555e6550N.exe 87 PID 5040 wrote to memory of 4652 5040 8593471e2db25971f5519849555e6550N.exe 88 PID 5040 wrote to memory of 4652 5040 8593471e2db25971f5519849555e6550N.exe 88 PID 5040 wrote to memory of 4652 5040 8593471e2db25971f5519849555e6550N.exe 88 PID 4652 wrote to memory of 4124 4652 cmd.exe 90 PID 4652 wrote to memory of 4124 4652 cmd.exe 90 PID 4652 wrote to memory of 4124 4652 cmd.exe 90 PID 5040 wrote to memory of 1612 5040 8593471e2db25971f5519849555e6550N.exe 91 PID 5040 wrote to memory of 1612 5040 8593471e2db25971f5519849555e6550N.exe 91 PID 5040 wrote to memory of 1612 5040 8593471e2db25971f5519849555e6550N.exe 91 PID 5040 wrote to memory of 5008 5040 8593471e2db25971f5519849555e6550N.exe 92 PID 5040 wrote to memory of 5008 5040 8593471e2db25971f5519849555e6550N.exe 92 PID 5040 wrote to memory of 5008 5040 8593471e2db25971f5519849555e6550N.exe 92 PID 5040 wrote to memory of 4928 5040 8593471e2db25971f5519849555e6550N.exe 93 PID 5040 wrote to memory of 4928 5040 8593471e2db25971f5519849555e6550N.exe 93 PID 5040 wrote to memory of 4928 5040 8593471e2db25971f5519849555e6550N.exe 93 PID 5040 wrote to memory of 4740 5040 8593471e2db25971f5519849555e6550N.exe 94 PID 5040 wrote to memory of 4740 5040 8593471e2db25971f5519849555e6550N.exe 94 PID 5040 wrote to memory of 4740 5040 8593471e2db25971f5519849555e6550N.exe 94 PID 4740 wrote to memory of 2340 4740 cmd.exe 99 PID 4740 wrote to memory of 2340 4740 cmd.exe 99 PID 4740 wrote to memory of 2340 4740 cmd.exe 99 PID 4124 wrote to memory of 3408 4124 8593471e2db25971f5519849555e6550N.exe 101 PID 4124 wrote to memory of 3408 4124 8593471e2db25971f5519849555e6550N.exe 101 PID 4124 wrote to memory of 3408 4124 8593471e2db25971f5519849555e6550N.exe 101 PID 3408 wrote to memory of 3108 3408 cmd.exe 103 PID 3408 wrote to memory of 3108 3408 cmd.exe 103 PID 3408 wrote to memory of 3108 3408 cmd.exe 103 PID 4124 wrote to memory of 2948 4124 8593471e2db25971f5519849555e6550N.exe 104 PID 4124 wrote to memory of 2948 4124 8593471e2db25971f5519849555e6550N.exe 104 PID 4124 wrote to memory of 2948 4124 8593471e2db25971f5519849555e6550N.exe 104 PID 4124 wrote to memory of 4796 4124 8593471e2db25971f5519849555e6550N.exe 105 PID 4124 wrote to memory of 4796 4124 8593471e2db25971f5519849555e6550N.exe 105 PID 4124 wrote to memory of 4796 4124 8593471e2db25971f5519849555e6550N.exe 105 PID 4124 wrote to memory of 4524 4124 8593471e2db25971f5519849555e6550N.exe 106 PID 4124 wrote to memory of 4524 4124 8593471e2db25971f5519849555e6550N.exe 106 PID 4124 wrote to memory of 4524 4124 8593471e2db25971f5519849555e6550N.exe 106 PID 4124 wrote to memory of 4956 4124 8593471e2db25971f5519849555e6550N.exe 107 PID 4124 wrote to memory of 4956 4124 8593471e2db25971f5519849555e6550N.exe 107 PID 4124 wrote to memory of 4956 4124 8593471e2db25971f5519849555e6550N.exe 107 PID 4956 wrote to memory of 4544 4956 cmd.exe 112 PID 4956 wrote to memory of 4544 4956 cmd.exe 112 PID 4956 wrote to memory of 4544 4956 cmd.exe 112 PID 3108 wrote to memory of 3740 3108 8593471e2db25971f5519849555e6550N.exe 113 PID 3108 wrote to memory of 3740 3108 8593471e2db25971f5519849555e6550N.exe 113 PID 3108 wrote to memory of 3740 3108 8593471e2db25971f5519849555e6550N.exe 113 PID 3740 wrote to memory of 1752 3740 cmd.exe 115 PID 3740 wrote to memory of 1752 3740 cmd.exe 115 PID 3740 wrote to memory of 1752 3740 cmd.exe 115 PID 3108 wrote to memory of 3576 3108 8593471e2db25971f5519849555e6550N.exe 116 PID 3108 wrote to memory of 3576 3108 8593471e2db25971f5519849555e6550N.exe 116 PID 3108 wrote to memory of 3576 3108 8593471e2db25971f5519849555e6550N.exe 116 PID 3108 wrote to memory of 588 3108 8593471e2db25971f5519849555e6550N.exe 117 PID 3108 wrote to memory of 588 3108 8593471e2db25971f5519849555e6550N.exe 117 PID 3108 wrote to memory of 588 3108 8593471e2db25971f5519849555e6550N.exe 117 PID 3108 wrote to memory of 1652 3108 8593471e2db25971f5519849555e6550N.exe 118 PID 3108 wrote to memory of 1652 3108 8593471e2db25971f5519849555e6550N.exe 118 PID 3108 wrote to memory of 1652 3108 8593471e2db25971f5519849555e6550N.exe 118 PID 3108 wrote to memory of 4008 3108 8593471e2db25971f5519849555e6550N.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exe"C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\eCEgMsQo\pAcMggcw.exe"C:\Users\Admin\eCEgMsQo\pAcMggcw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:896
-
-
C:\ProgramData\SkUEYEkQ\JSkYEcMw.exe"C:\ProgramData\SkUEYEkQ\JSkYEcMw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"2⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"4⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"6⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"8⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"10⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N11⤵
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"12⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"14⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N15⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"16⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"18⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N19⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"20⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"22⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"24⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"26⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"28⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"30⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N31⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"32⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N33⤵
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"34⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N35⤵PID:2396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"36⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N37⤵PID:384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"38⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N39⤵PID:224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"40⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N41⤵PID:1384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"42⤵
- System Location Discovery: System Language Discovery
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N43⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"44⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N45⤵PID:2968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"46⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N47⤵PID:3820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"48⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N49⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"50⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N51⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"52⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N53⤵PID:2276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"54⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N55⤵PID:1616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"56⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N57⤵PID:2380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"58⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N59⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"60⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N61⤵
- System Location Discovery: System Language Discovery
PID:4168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"62⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N63⤵PID:4876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"64⤵
- System Location Discovery: System Language Discovery
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N65⤵PID:3608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"66⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N67⤵PID:4392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"68⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N69⤵PID:4324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"70⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N71⤵PID:2692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"72⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N73⤵PID:4824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"74⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N75⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"76⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N77⤵PID:3868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"78⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N79⤵PID:4144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"80⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N81⤵PID:2192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"82⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N83⤵PID:4516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"84⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N85⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"86⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N87⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"88⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N89⤵PID:1680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"90⤵
- System Location Discovery: System Language Discovery
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N91⤵PID:1540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"92⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N93⤵PID:3612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"94⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N95⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"96⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N97⤵PID:1544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"98⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N99⤵PID:4920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"100⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N101⤵PID:2636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"102⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N103⤵PID:3084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"104⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N105⤵PID:424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"106⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N107⤵PID:3056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"108⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N109⤵PID:4008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"110⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N111⤵PID:3976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"112⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N113⤵PID:4240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"114⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N115⤵PID:992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"116⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N117⤵PID:3972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"118⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N119⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"120⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N.exeC:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N121⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8593471e2db25971f5519849555e6550N"122⤵PID:4340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-