Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe
Resource
win10v2004-20240802-en
General
-
Target
92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe
-
Size
116KB
-
MD5
5ec30a05138ce53b8d338bb9ad33e998
-
SHA1
018f78d6f87d945403f4a42b1cf013cee808bf5f
-
SHA256
92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d
-
SHA512
461ba759a55a78d75263d81bebc78113a1e4714fc35aab07dbfa600d8a9e0559ac89a36fd66dfde82ded868176f3a438fdc77157a9bc24eaf69782bbc81d5d9f
-
SSDEEP
3072:cin2jTqhTnqEwTTmO1APiVd3Jz3sVdZkAaMzrtmnajl5DYOF777777777e:Zu23Oqaf3lsVUw6c5kOI
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 62 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\Geo\Nation pwswYAMI.exe -
Executes dropped EXE 2 IoCs
pid Process 1608 pwswYAMI.exe 1648 JCMcUEcA.exe -
Loads dropped DLL 20 IoCs
pid Process 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\pwswYAMI.exe = "C:\\Users\\Admin\\euoAcgYQ\\pwswYAMI.exe" pwswYAMI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JCMcUEcA.exe = "C:\\ProgramData\\TQAYUAYw\\JCMcUEcA.exe" JCMcUEcA.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\pwswYAMI.exe = "C:\\Users\\Admin\\euoAcgYQ\\pwswYAMI.exe" 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JCMcUEcA.exe = "C:\\ProgramData\\TQAYUAYw\\JCMcUEcA.exe" 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico pwswYAMI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2780 reg.exe 2836 reg.exe 1748 reg.exe 336 reg.exe 2784 reg.exe 1240 reg.exe 3044 reg.exe 264 reg.exe 880 reg.exe 404 reg.exe 2300 reg.exe 932 reg.exe 1820 reg.exe 2492 reg.exe 1656 reg.exe 1248 reg.exe 2372 reg.exe 916 reg.exe 860 reg.exe 2676 reg.exe 464 reg.exe 884 reg.exe 1028 reg.exe 756 reg.exe 532 reg.exe 2800 reg.exe 2504 reg.exe 552 reg.exe 3012 reg.exe 1220 reg.exe 1580 reg.exe 964 reg.exe 2464 reg.exe 2596 reg.exe 524 reg.exe 2836 reg.exe 2504 reg.exe 1656 reg.exe 1660 reg.exe 2420 reg.exe 2492 reg.exe 2568 reg.exe 880 reg.exe 844 reg.exe 1976 reg.exe 692 reg.exe 2420 reg.exe 3012 reg.exe 1840 reg.exe 2620 reg.exe 2880 reg.exe 756 reg.exe 2588 reg.exe 2376 reg.exe 1252 reg.exe 1632 reg.exe 2144 reg.exe 2824 reg.exe 2360 reg.exe 984 reg.exe 1596 reg.exe 2108 reg.exe 2944 reg.exe 2492 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1880 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1880 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 544 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 544 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 624 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 624 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 3020 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 3020 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1860 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1860 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2956 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2956 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2396 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2396 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1184 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1184 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1240 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1240 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2656 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2656 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2344 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2344 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1528 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1528 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1764 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1764 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1320 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1320 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2160 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2160 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 880 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 880 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2864 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2864 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 560 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 560 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2360 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2360 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1656 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1656 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1604 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1604 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1644 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 1644 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 268 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 268 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 608 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 608 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2284 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2284 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2684 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2684 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2132 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2132 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2404 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 2404 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1608 pwswYAMI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe 1608 pwswYAMI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1608 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 31 PID 2364 wrote to memory of 1608 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 31 PID 2364 wrote to memory of 1608 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 31 PID 2364 wrote to memory of 1608 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 31 PID 2364 wrote to memory of 1648 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 32 PID 2364 wrote to memory of 1648 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 32 PID 2364 wrote to memory of 1648 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 32 PID 2364 wrote to memory of 1648 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 32 PID 2364 wrote to memory of 2728 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 33 PID 2364 wrote to memory of 2728 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 33 PID 2364 wrote to memory of 2728 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 33 PID 2364 wrote to memory of 2728 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 33 PID 2728 wrote to memory of 2888 2728 cmd.exe 35 PID 2728 wrote to memory of 2888 2728 cmd.exe 35 PID 2728 wrote to memory of 2888 2728 cmd.exe 35 PID 2728 wrote to memory of 2888 2728 cmd.exe 35 PID 2364 wrote to memory of 2972 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 36 PID 2364 wrote to memory of 2972 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 36 PID 2364 wrote to memory of 2972 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 36 PID 2364 wrote to memory of 2972 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 36 PID 2364 wrote to memory of 2920 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 37 PID 2364 wrote to memory of 2920 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 37 PID 2364 wrote to memory of 2920 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 37 PID 2364 wrote to memory of 2920 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 37 PID 2364 wrote to memory of 2752 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 39 PID 2364 wrote to memory of 2752 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 39 PID 2364 wrote to memory of 2752 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 39 PID 2364 wrote to memory of 2752 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 39 PID 2364 wrote to memory of 2740 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 41 PID 2364 wrote to memory of 2740 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 41 PID 2364 wrote to memory of 2740 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 41 PID 2364 wrote to memory of 2740 2364 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 41 PID 2740 wrote to memory of 2788 2740 cmd.exe 44 PID 2740 wrote to memory of 2788 2740 cmd.exe 44 PID 2740 wrote to memory of 2788 2740 cmd.exe 44 PID 2740 wrote to memory of 2788 2740 cmd.exe 44 PID 2888 wrote to memory of 2340 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 45 PID 2888 wrote to memory of 2340 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 45 PID 2888 wrote to memory of 2340 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 45 PID 2888 wrote to memory of 2340 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 45 PID 2340 wrote to memory of 1880 2340 cmd.exe 47 PID 2340 wrote to memory of 1880 2340 cmd.exe 47 PID 2340 wrote to memory of 1880 2340 cmd.exe 47 PID 2340 wrote to memory of 1880 2340 cmd.exe 47 PID 2888 wrote to memory of 2344 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 48 PID 2888 wrote to memory of 2344 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 48 PID 2888 wrote to memory of 2344 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 48 PID 2888 wrote to memory of 2344 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 48 PID 2888 wrote to memory of 1580 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 49 PID 2888 wrote to memory of 1580 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 49 PID 2888 wrote to memory of 1580 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 49 PID 2888 wrote to memory of 1580 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 49 PID 2888 wrote to memory of 2836 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 51 PID 2888 wrote to memory of 2836 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 51 PID 2888 wrote to memory of 2836 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 51 PID 2888 wrote to memory of 2836 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 51 PID 2888 wrote to memory of 3036 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 54 PID 2888 wrote to memory of 3036 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 54 PID 2888 wrote to memory of 3036 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 54 PID 2888 wrote to memory of 3036 2888 92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe 54 PID 3036 wrote to memory of 2932 3036 cmd.exe 56 PID 3036 wrote to memory of 2932 3036 cmd.exe 56 PID 3036 wrote to memory of 2932 3036 cmd.exe 56 PID 3036 wrote to memory of 2932 3036 cmd.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe"C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\euoAcgYQ\pwswYAMI.exe"C:\Users\Admin\euoAcgYQ\pwswYAMI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1608
-
-
C:\ProgramData\TQAYUAYw\JCMcUEcA.exe"C:\ProgramData\TQAYUAYw\JCMcUEcA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1648
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"2⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"4⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"6⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d7⤵
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"8⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d9⤵
- Suspicious behavior: EnumeratesProcesses
PID:624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"10⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"12⤵
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"14⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"16⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"18⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"20⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"22⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d23⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"24⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"26⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d27⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"28⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"30⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"32⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"34⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"36⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d37⤵
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"38⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"40⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d41⤵
- Suspicious behavior: EnumeratesProcesses
PID:560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"42⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"44⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d45⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"46⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"48⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"50⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d51⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"52⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"54⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d55⤵
- Suspicious behavior: EnumeratesProcesses
PID:608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"56⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"58⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"60⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"62⤵
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d63⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"64⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d65⤵PID:2732
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"66⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d67⤵PID:3016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"68⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d69⤵PID:2660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"70⤵
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d71⤵PID:1084
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"72⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d73⤵PID:2420
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"74⤵
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d75⤵
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"76⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d77⤵PID:1584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"78⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d79⤵PID:836
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"80⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d81⤵PID:1080
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"82⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d83⤵PID:2848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"84⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d85⤵PID:1832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"86⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d87⤵PID:2856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"88⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d89⤵PID:1520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"90⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d91⤵
- System Location Discovery: System Language Discovery
PID:984 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"92⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d93⤵PID:1948
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"94⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d95⤵PID:1548
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"96⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d97⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"98⤵
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d99⤵PID:1604
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"100⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d101⤵PID:2812
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"102⤵
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d103⤵
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"104⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d105⤵PID:2784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"106⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d107⤵
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"108⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d109⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"110⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d111⤵
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"112⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d113⤵PID:2024
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"114⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d115⤵
- System Location Discovery: System Language Discovery
PID:1040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"116⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d117⤵PID:688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"118⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d119⤵
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"120⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d.exeC:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d121⤵
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\92b5c80c21f2e8f4eb0c88d349ec911ab27a8b27a4205d98bc34833d85f2d33d"122⤵PID:2796
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-