Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe
Resource
win10v2004-20240802-en
General
-
Target
dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe
-
Size
113KB
-
MD5
1c1273edc36515ff69e34cba84421e84
-
SHA1
00403d7201fb0f975a81f174b460053007597fd9
-
SHA256
dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079
-
SHA512
035d4424bf53899ad6c28b1dbee39cb4769c51b2f5977e693de852d80cba55afbb176680226b8783c2d60109a929da3af9fe8c25cbd10fedeaec24b4fa05466b
-
SSDEEP
3072:3RK9oIJ2JJ3/FmGmqddftdQrgoG840T60Bk6ezYZP50ENMYX+ODqHzMkfbeYuSTX:3o/JKJsGNftdQrgoG840T60Bk6ezYZPs
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (78) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation PksocsIE.exe -
Executes dropped EXE 2 IoCs
pid Process 2864 FywMEUQQ.exe 4928 PksocsIE.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PksocsIE.exe = "C:\\ProgramData\\eUokUQoE\\PksocsIE.exe" dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PksocsIE.exe = "C:\\ProgramData\\eUokUQoE\\PksocsIE.exe" PksocsIE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FywMEUQQ.exe = "C:\\Users\\Admin\\LIcAoAAc\\FywMEUQQ.exe" FywMEUQQ.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FywMEUQQ.exe = "C:\\Users\\Admin\\LIcAoAAc\\FywMEUQQ.exe" dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 4188 reg.exe 976 reg.exe 3024 reg.exe 3976 reg.exe 1724 reg.exe 4056 reg.exe 436 reg.exe 2508 reg.exe 868 reg.exe 3976 reg.exe 2540 reg.exe 2120 reg.exe 4232 reg.exe 2492 reg.exe 556 reg.exe 4808 reg.exe 3496 reg.exe 2760 reg.exe 2608 reg.exe 3964 reg.exe 2472 reg.exe 4400 reg.exe 920 reg.exe 1264 reg.exe 2800 reg.exe 4736 reg.exe 3980 reg.exe 5036 reg.exe 4932 reg.exe 628 reg.exe 2456 reg.exe 1220 reg.exe 1996 reg.exe 4476 reg.exe 1724 reg.exe 2464 reg.exe 4972 reg.exe 2372 reg.exe 2512 reg.exe 1008 reg.exe 3336 reg.exe 3864 reg.exe 2924 reg.exe 4196 reg.exe 3012 reg.exe 2668 reg.exe 4244 reg.exe 5036 reg.exe 3980 reg.exe 4832 reg.exe 1708 reg.exe 1692 reg.exe 3684 reg.exe 1688 reg.exe 1684 reg.exe 2376 reg.exe 2224 reg.exe 3668 reg.exe 5060 reg.exe 4020 reg.exe 1200 reg.exe 2188 reg.exe 3996 reg.exe 4480 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1264 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1264 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1264 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1264 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 3944 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 3944 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 3944 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 3944 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4396 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4396 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4396 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4396 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4648 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4648 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4648 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4648 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1224 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1224 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1224 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1224 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 2372 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 2372 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 2372 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 2372 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1008 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1008 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1008 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 1008 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 836 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 836 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 836 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 836 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4816 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4816 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4816 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4816 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 5116 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 5116 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 5116 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 5116 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4664 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4664 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4664 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4664 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4188 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4188 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4188 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 4188 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 2232 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 2232 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 2232 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 2232 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4928 PksocsIE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe 4928 PksocsIE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4476 wrote to memory of 2864 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 82 PID 4476 wrote to memory of 2864 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 82 PID 4476 wrote to memory of 2864 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 82 PID 4476 wrote to memory of 4928 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 83 PID 4476 wrote to memory of 4928 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 83 PID 4476 wrote to memory of 4928 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 83 PID 4476 wrote to memory of 4108 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 84 PID 4476 wrote to memory of 4108 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 84 PID 4476 wrote to memory of 4108 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 84 PID 4476 wrote to memory of 3904 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 86 PID 4476 wrote to memory of 3904 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 86 PID 4476 wrote to memory of 3904 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 86 PID 4476 wrote to memory of 3688 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 87 PID 4476 wrote to memory of 3688 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 87 PID 4476 wrote to memory of 3688 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 87 PID 4476 wrote to memory of 4908 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 88 PID 4476 wrote to memory of 4908 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 88 PID 4476 wrote to memory of 4908 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 88 PID 4476 wrote to memory of 988 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 89 PID 4476 wrote to memory of 988 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 89 PID 4476 wrote to memory of 988 4476 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 89 PID 4108 wrote to memory of 2604 4108 cmd.exe 94 PID 4108 wrote to memory of 2604 4108 cmd.exe 94 PID 4108 wrote to memory of 2604 4108 cmd.exe 94 PID 988 wrote to memory of 4924 988 cmd.exe 95 PID 988 wrote to memory of 4924 988 cmd.exe 95 PID 988 wrote to memory of 4924 988 cmd.exe 95 PID 2604 wrote to memory of 4968 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 96 PID 2604 wrote to memory of 4968 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 96 PID 2604 wrote to memory of 4968 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 96 PID 4968 wrote to memory of 1964 4968 cmd.exe 98 PID 4968 wrote to memory of 1964 4968 cmd.exe 98 PID 4968 wrote to memory of 1964 4968 cmd.exe 98 PID 2604 wrote to memory of 3952 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 99 PID 2604 wrote to memory of 3952 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 99 PID 2604 wrote to memory of 3952 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 99 PID 2604 wrote to memory of 3200 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 100 PID 2604 wrote to memory of 3200 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 100 PID 2604 wrote to memory of 3200 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 100 PID 2604 wrote to memory of 2348 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 101 PID 2604 wrote to memory of 2348 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 101 PID 2604 wrote to memory of 2348 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 101 PID 2604 wrote to memory of 2076 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 102 PID 2604 wrote to memory of 2076 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 102 PID 2604 wrote to memory of 2076 2604 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 102 PID 2076 wrote to memory of 3308 2076 cmd.exe 107 PID 2076 wrote to memory of 3308 2076 cmd.exe 107 PID 2076 wrote to memory of 3308 2076 cmd.exe 107 PID 1964 wrote to memory of 1164 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 108 PID 1964 wrote to memory of 1164 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 108 PID 1964 wrote to memory of 1164 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 108 PID 1164 wrote to memory of 1264 1164 cmd.exe 110 PID 1164 wrote to memory of 1264 1164 cmd.exe 110 PID 1164 wrote to memory of 1264 1164 cmd.exe 110 PID 1964 wrote to memory of 4024 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 111 PID 1964 wrote to memory of 4024 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 111 PID 1964 wrote to memory of 4024 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 111 PID 1964 wrote to memory of 436 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 112 PID 1964 wrote to memory of 436 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 112 PID 1964 wrote to memory of 436 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 112 PID 1964 wrote to memory of 1888 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 113 PID 1964 wrote to memory of 1888 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 113 PID 1964 wrote to memory of 1888 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 113 PID 1964 wrote to memory of 4552 1964 dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe"C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\LIcAoAAc\FywMEUQQ.exe"C:\Users\Admin\LIcAoAAc\FywMEUQQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2864
-
-
C:\ProgramData\eUokUQoE\PksocsIE.exe"C:\ProgramData\eUokUQoE\PksocsIE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"2⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a0793⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"4⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a0795⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a0797⤵
- Suspicious behavior: EnumeratesProcesses
PID:1264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"8⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a0799⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"10⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07911⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"12⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07913⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"14⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07915⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"16⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07917⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"18⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07919⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"20⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07921⤵
- Suspicious behavior: EnumeratesProcesses
PID:836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"22⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07923⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"24⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07925⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"26⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07927⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"28⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07929⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"30⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07931⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"32⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07933⤵
- System Location Discovery: System Language Discovery
PID:3160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"34⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07935⤵PID:4416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"36⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07937⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"38⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07939⤵PID:2776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"40⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07941⤵PID:3076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"42⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07943⤵PID:3012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"44⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07945⤵PID:2264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"46⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07947⤵PID:776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"48⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07949⤵PID:1140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"50⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07951⤵PID:4760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"52⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07953⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"54⤵
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07955⤵PID:1524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"56⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07957⤵PID:212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"58⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07959⤵PID:1168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"60⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07961⤵PID:2780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"62⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07963⤵
- System Location Discovery: System Language Discovery
PID:4244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"64⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07965⤵PID:1788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"66⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07967⤵PID:3912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"68⤵
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07969⤵PID:2856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"70⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07971⤵PID:396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"72⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07973⤵PID:1628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"74⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07975⤵PID:1984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"76⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07977⤵PID:704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"78⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07979⤵PID:2888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"80⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07981⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"82⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07983⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"84⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07985⤵PID:4136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"86⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07987⤵PID:4128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"88⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07989⤵PID:1524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"90⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07991⤵PID:4216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"92⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07993⤵PID:560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"94⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07995⤵PID:1664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"96⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07997⤵
- System Location Discovery: System Language Discovery
PID:3184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"98⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a07999⤵PID:3744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"100⤵
- System Location Discovery: System Language Discovery
PID:544 -
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079101⤵PID:2888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"102⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079103⤵PID:2152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"104⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079105⤵PID:3724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"106⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079107⤵PID:2740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"108⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079109⤵
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"110⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079111⤵PID:1976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"112⤵
- System Location Discovery: System Language Discovery
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079113⤵PID:3904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"114⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079115⤵PID:3632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"116⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079117⤵PID:3804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"118⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079119⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"120⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079.exeC:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079121⤵PID:1968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dfe9a90893b4ff71f5fca648a3bb3fba9601f2d02eb6a3874e88d3851bc6a079"122⤵PID:3880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-