Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe
Resource
win10v2004-20240802-en
General
-
Target
1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe
-
Size
187KB
-
MD5
9fa50eca1b16eb78840fd1258c91a7f0
-
SHA1
6b8f49299e34269338b037d8f33f454219a62ace
-
SHA256
1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4
-
SHA512
3dcd9fa8a9ea3358513933bf3a8d02a0471c90ee94e9e1dc0c9009205d3f4c14aa3e9f0feacbbedfe75352ec38de714f5d1a77401a634e5491069a2281ad59d3
-
SSDEEP
3072:nerbWgA4TIIZ3igaGCmaVxAbzZSOwFz2JPrFkW/7fXbG3poBTJgAg1Ci/B8JE+7x:ner7TdcgaGlaHOLU4PrFkW/7frG3p6lQ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (79) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation GQsEUYcI.exe -
Executes dropped EXE 2 IoCs
pid Process 3812 GQsEUYcI.exe 2924 TEUIooQU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GQsEUYcI.exe = "C:\\Users\\Admin\\NsMkEoYM\\GQsEUYcI.exe" 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TEUIooQU.exe = "C:\\ProgramData\\nUQksUMI\\TEUIooQU.exe" 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GQsEUYcI.exe = "C:\\Users\\Admin\\NsMkEoYM\\GQsEUYcI.exe" GQsEUYcI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TEUIooQU.exe = "C:\\ProgramData\\nUQksUMI\\TEUIooQU.exe" TEUIooQU.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe GQsEUYcI.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe GQsEUYcI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2304 reg.exe 216 reg.exe 4624 reg.exe 3468 reg.exe 636 Process not Found 2872 reg.exe 3552 reg.exe 2736 reg.exe 4432 Process not Found 1460 reg.exe 2280 reg.exe 3112 reg.exe 3972 reg.exe 4456 reg.exe 5056 reg.exe 5076 Process not Found 840 reg.exe 4388 reg.exe 856 reg.exe 400 Process not Found 3012 reg.exe 2016 reg.exe 824 reg.exe 3592 reg.exe 4844 reg.exe 3060 reg.exe 2644 reg.exe 628 reg.exe 1268 reg.exe 2248 reg.exe 1964 reg.exe 4348 reg.exe 1464 Process not Found 448 Process not Found 5108 reg.exe 3552 reg.exe 3204 reg.exe 3828 reg.exe 2616 reg.exe 1668 reg.exe 2432 reg.exe 396 reg.exe 924 reg.exe 2348 reg.exe 664 reg.exe 652 reg.exe 216 reg.exe 2680 reg.exe 1240 reg.exe 2152 reg.exe 1540 reg.exe 5048 reg.exe 384 reg.exe 2308 reg.exe 4604 reg.exe 4972 reg.exe 1112 reg.exe 2492 reg.exe 2736 reg.exe 1104 Process not Found 4908 reg.exe 3708 reg.exe 2640 reg.exe 2228 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4516 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4516 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4516 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4516 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2280 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2280 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2280 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2280 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4104 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4104 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4104 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4104 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4572 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4572 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4572 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4572 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2064 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2064 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2064 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2064 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 396 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 396 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 396 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 396 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2552 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2552 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2552 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2552 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 1616 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 1616 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 1616 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 1616 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 944 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 944 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 944 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 944 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2232 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2232 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2232 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2232 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4512 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4512 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4512 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 4512 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2840 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2840 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2840 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 2840 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 1020 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 1020 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 1020 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 1020 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3812 GQsEUYcI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe 3812 GQsEUYcI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 208 wrote to memory of 3812 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 82 PID 208 wrote to memory of 3812 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 82 PID 208 wrote to memory of 3812 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 82 PID 208 wrote to memory of 2924 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 83 PID 208 wrote to memory of 2924 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 83 PID 208 wrote to memory of 2924 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 83 PID 208 wrote to memory of 3700 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 84 PID 208 wrote to memory of 3700 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 84 PID 208 wrote to memory of 3700 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 84 PID 3700 wrote to memory of 4828 3700 cmd.exe 86 PID 3700 wrote to memory of 4828 3700 cmd.exe 86 PID 3700 wrote to memory of 4828 3700 cmd.exe 86 PID 208 wrote to memory of 2276 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 87 PID 208 wrote to memory of 2276 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 87 PID 208 wrote to memory of 2276 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 87 PID 208 wrote to memory of 3716 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 88 PID 208 wrote to memory of 3716 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 88 PID 208 wrote to memory of 3716 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 88 PID 208 wrote to memory of 3696 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 89 PID 208 wrote to memory of 3696 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 89 PID 208 wrote to memory of 3696 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 89 PID 208 wrote to memory of 3868 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 90 PID 208 wrote to memory of 3868 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 90 PID 208 wrote to memory of 3868 208 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 90 PID 3868 wrote to memory of 1112 3868 cmd.exe 95 PID 3868 wrote to memory of 1112 3868 cmd.exe 95 PID 3868 wrote to memory of 1112 3868 cmd.exe 95 PID 4828 wrote to memory of 1964 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 96 PID 4828 wrote to memory of 1964 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 96 PID 4828 wrote to memory of 1964 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 96 PID 1964 wrote to memory of 4624 1964 cmd.exe 98 PID 1964 wrote to memory of 4624 1964 cmd.exe 98 PID 1964 wrote to memory of 4624 1964 cmd.exe 98 PID 4828 wrote to memory of 3584 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 99 PID 4828 wrote to memory of 3584 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 99 PID 4828 wrote to memory of 3584 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 99 PID 4828 wrote to memory of 2068 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 100 PID 4828 wrote to memory of 2068 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 100 PID 4828 wrote to memory of 2068 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 100 PID 4828 wrote to memory of 2192 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 101 PID 4828 wrote to memory of 2192 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 101 PID 4828 wrote to memory of 2192 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 101 PID 4828 wrote to memory of 228 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 102 PID 4828 wrote to memory of 228 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 102 PID 4828 wrote to memory of 228 4828 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 102 PID 228 wrote to memory of 4312 228 cmd.exe 107 PID 228 wrote to memory of 4312 228 cmd.exe 107 PID 228 wrote to memory of 4312 228 cmd.exe 107 PID 4624 wrote to memory of 252 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 108 PID 4624 wrote to memory of 252 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 108 PID 4624 wrote to memory of 252 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 108 PID 252 wrote to memory of 4516 252 cmd.exe 110 PID 252 wrote to memory of 4516 252 cmd.exe 110 PID 252 wrote to memory of 4516 252 cmd.exe 110 PID 4624 wrote to memory of 3228 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 111 PID 4624 wrote to memory of 3228 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 111 PID 4624 wrote to memory of 3228 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 111 PID 4624 wrote to memory of 2644 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 112 PID 4624 wrote to memory of 2644 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 112 PID 4624 wrote to memory of 2644 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 112 PID 4624 wrote to memory of 3828 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 113 PID 4624 wrote to memory of 3828 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 113 PID 4624 wrote to memory of 3828 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 113 PID 4624 wrote to memory of 976 4624 1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe"C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\NsMkEoYM\GQsEUYcI.exe"C:\Users\Admin\NsMkEoYM\GQsEUYcI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3812
-
-
C:\ProgramData\nUQksUMI\TEUIooQU.exe"C:\ProgramData\nUQksUMI\TEUIooQU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"2⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"4⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"6⤵
- Suspicious use of WriteProcessMemory
PID:252 -
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"8⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"10⤵
- System Location Discovery: System Language Discovery
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"12⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"14⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"16⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N17⤵
- Suspicious behavior: EnumeratesProcesses
PID:396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"18⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"20⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"22⤵
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N23⤵
- Suspicious behavior: EnumeratesProcesses
PID:944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"24⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N25⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"26⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"28⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"30⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"32⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N33⤵PID:3504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"34⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N35⤵PID:3660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"36⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N37⤵PID:5108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"38⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N39⤵PID:1220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"40⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N41⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"42⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N43⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"44⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N45⤵PID:2488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"46⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N47⤵PID:3472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"48⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N49⤵PID:208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"50⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N51⤵PID:2768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"52⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N53⤵PID:2388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"54⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N55⤵PID:3240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"56⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N57⤵PID:2884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"58⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N59⤵PID:3228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"60⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N61⤵PID:4684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"62⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N63⤵PID:2136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"64⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N65⤵PID:2020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"66⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N67⤵PID:5060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"68⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N69⤵PID:1636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"70⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N71⤵
- System Location Discovery: System Language Discovery
PID:3500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"72⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N73⤵PID:2368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"74⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N75⤵PID:4888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"76⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N77⤵PID:2428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"78⤵
- System Location Discovery: System Language Discovery
PID:400 -
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N79⤵PID:1268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"80⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N81⤵PID:4972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"82⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N83⤵PID:3984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"84⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N85⤵PID:1756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"86⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N87⤵PID:1516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"88⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N89⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"90⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N91⤵PID:1616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"92⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N93⤵PID:872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"94⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N95⤵PID:2632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"96⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N97⤵PID:3764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"98⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N99⤵PID:1896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"100⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N101⤵PID:4900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"102⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N103⤵PID:1116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"104⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N105⤵PID:3060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"106⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N107⤵PID:1272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"108⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N109⤵PID:4668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"110⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N111⤵PID:3228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"112⤵
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N113⤵PID:4932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"114⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N115⤵PID:2452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"116⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N117⤵PID:2580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"118⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N119⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"120⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N.exeC:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N121⤵PID:5008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1a48fbfdf666cb0452c41f5dfde50661652be9e8fceb6dbec50a52c937b5f1e4N"122⤵PID:3400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-