Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe
Resource
win10v2004-20240802-en
General
-
Target
ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe
-
Size
196KB
-
MD5
bceb210f414ff6adfa63b6debe403510
-
SHA1
18381302ef676cf5fb15a584c4a456ee175db313
-
SHA256
ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16c
-
SHA512
03893003199b087c508a4d141502ec1c60b831ae3a6bef6d92a898a5c8d4472aaee0e294eb469380c51a4cc19d077a5bae7f94aca8bf868f79fe4b9680116f18
-
SSDEEP
3072:5vDJY/eWZqYauFiIfNLCqcyM99OqJ+jtYxpZ5nk7pztomi5BWzGmeWBRcIP6CwX:5qGW0Ts/NbcyU9XJ+jtYd5mBD6X4pn9
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (79) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation TwsEsMsI.exe -
Executes dropped EXE 2 IoCs
pid Process 3944 SawUwgAM.exe 1288 TwsEsMsI.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SawUwgAM.exe = "C:\\Users\\Admin\\JSIwYkgU\\SawUwgAM.exe" ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TwsEsMsI.exe = "C:\\ProgramData\\msoQkEwM\\TwsEsMsI.exe" ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TwsEsMsI.exe = "C:\\ProgramData\\msoQkEwM\\TwsEsMsI.exe" TwsEsMsI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SawUwgAM.exe = "C:\\Users\\Admin\\JSIwYkgU\\SawUwgAM.exe" SawUwgAM.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe TwsEsMsI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1764 reg.exe 3372 reg.exe 1736 reg.exe 3124 reg.exe 2844 reg.exe 2484 reg.exe 1840 reg.exe 1208 reg.exe 1876 reg.exe 452 reg.exe 2900 reg.exe 3476 reg.exe 2736 reg.exe 5084 reg.exe 2764 reg.exe 5000 reg.exe 3168 reg.exe 3224 reg.exe 3000 reg.exe 4000 reg.exe 4012 reg.exe 4104 reg.exe 2452 reg.exe 464 reg.exe 1016 reg.exe 2116 reg.exe 2288 reg.exe 3908 reg.exe 4932 Process not Found 5024 Process not Found 2704 reg.exe 2984 reg.exe 632 reg.exe 4996 reg.exe 3908 reg.exe 1688 Process not Found 3084 Process not Found 3440 reg.exe 232 reg.exe 3404 reg.exe 4464 reg.exe 4816 reg.exe 2304 reg.exe 444 reg.exe 1436 reg.exe 3216 reg.exe 1648 reg.exe 1032 reg.exe 5080 reg.exe 1684 Process not Found 4392 reg.exe 2052 reg.exe 764 reg.exe 4020 reg.exe 2656 Process not Found 4368 reg.exe 4484 reg.exe 2488 reg.exe 5084 Process not Found 1176 Process not Found 4400 reg.exe 4932 reg.exe 3684 reg.exe 3880 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3108 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3108 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3108 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3108 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4264 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4264 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4264 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4264 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4344 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4344 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4344 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4344 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4832 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4832 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4832 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4832 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3912 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3912 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3912 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3912 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2856 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2856 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2856 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2856 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4368 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4368 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4368 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4368 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2284 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2284 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2284 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 2284 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3460 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3460 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3460 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3460 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4732 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4732 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4732 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 4732 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3276 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3276 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3276 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3276 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 876 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 876 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 876 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 876 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3476 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3476 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3476 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 3476 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1288 TwsEsMsI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe 1288 TwsEsMsI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 100 wrote to memory of 3944 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 81 PID 100 wrote to memory of 3944 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 81 PID 100 wrote to memory of 3944 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 81 PID 100 wrote to memory of 1288 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 82 PID 100 wrote to memory of 1288 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 82 PID 100 wrote to memory of 1288 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 82 PID 100 wrote to memory of 2144 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 83 PID 100 wrote to memory of 2144 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 83 PID 100 wrote to memory of 2144 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 83 PID 2144 wrote to memory of 2000 2144 cmd.exe 85 PID 2144 wrote to memory of 2000 2144 cmd.exe 85 PID 2144 wrote to memory of 2000 2144 cmd.exe 85 PID 100 wrote to memory of 3912 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 86 PID 100 wrote to memory of 3912 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 86 PID 100 wrote to memory of 3912 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 86 PID 100 wrote to memory of 5084 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 87 PID 100 wrote to memory of 5084 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 87 PID 100 wrote to memory of 5084 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 87 PID 100 wrote to memory of 4392 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 88 PID 100 wrote to memory of 4392 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 88 PID 100 wrote to memory of 4392 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 88 PID 100 wrote to memory of 460 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 89 PID 100 wrote to memory of 460 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 89 PID 100 wrote to memory of 460 100 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 89 PID 460 wrote to memory of 868 460 cmd.exe 94 PID 460 wrote to memory of 868 460 cmd.exe 94 PID 460 wrote to memory of 868 460 cmd.exe 94 PID 2000 wrote to memory of 5088 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 95 PID 2000 wrote to memory of 5088 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 95 PID 2000 wrote to memory of 5088 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 95 PID 2000 wrote to memory of 3880 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 97 PID 2000 wrote to memory of 3880 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 97 PID 2000 wrote to memory of 3880 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 97 PID 2000 wrote to memory of 4084 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 98 PID 2000 wrote to memory of 4084 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 98 PID 2000 wrote to memory of 4084 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 98 PID 2000 wrote to memory of 3660 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 99 PID 2000 wrote to memory of 3660 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 99 PID 2000 wrote to memory of 3660 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 99 PID 2000 wrote to memory of 2260 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 100 PID 2000 wrote to memory of 2260 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 100 PID 2000 wrote to memory of 2260 2000 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 100 PID 5088 wrote to memory of 3192 5088 cmd.exe 101 PID 5088 wrote to memory of 3192 5088 cmd.exe 101 PID 5088 wrote to memory of 3192 5088 cmd.exe 101 PID 2260 wrote to memory of 2700 2260 cmd.exe 106 PID 2260 wrote to memory of 2700 2260 cmd.exe 106 PID 2260 wrote to memory of 2700 2260 cmd.exe 106 PID 3192 wrote to memory of 3184 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 107 PID 3192 wrote to memory of 3184 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 107 PID 3192 wrote to memory of 3184 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 107 PID 3184 wrote to memory of 3108 3184 cmd.exe 109 PID 3184 wrote to memory of 3108 3184 cmd.exe 109 PID 3184 wrote to memory of 3108 3184 cmd.exe 109 PID 3192 wrote to memory of 2884 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 110 PID 3192 wrote to memory of 2884 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 110 PID 3192 wrote to memory of 2884 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 110 PID 3192 wrote to memory of 4776 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 111 PID 3192 wrote to memory of 4776 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 111 PID 3192 wrote to memory of 4776 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 111 PID 3192 wrote to memory of 528 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 112 PID 3192 wrote to memory of 528 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 112 PID 3192 wrote to memory of 528 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 112 PID 3192 wrote to memory of 3404 3192 ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe"C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\JSIwYkgU\SawUwgAM.exe"C:\Users\Admin\JSIwYkgU\SawUwgAM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3944
-
-
C:\ProgramData\msoQkEwM\TwsEsMsI.exe"C:\ProgramData\msoQkEwM\TwsEsMsI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"2⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"4⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"6⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"8⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"10⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"12⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"14⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"16⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"18⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN19⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"20⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"22⤵
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"24⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"26⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"28⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN29⤵
- Suspicious behavior: EnumeratesProcesses
PID:876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"30⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"32⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN33⤵PID:768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"34⤵
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN35⤵PID:3164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"36⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN37⤵PID:3452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"38⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN39⤵PID:1764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"40⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN41⤵PID:2300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"42⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN43⤵PID:2348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"44⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN45⤵
- System Location Discovery: System Language Discovery
PID:4556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"46⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN47⤵PID:636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"48⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN49⤵PID:2784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"50⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN51⤵PID:3912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"52⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN53⤵PID:4216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"54⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN55⤵PID:404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"56⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN57⤵PID:1632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"58⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN59⤵PID:1676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"60⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN61⤵PID:1568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"62⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN63⤵PID:2852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"64⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN65⤵PID:816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"66⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN67⤵PID:3112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"68⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN69⤵PID:2680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"70⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN71⤵PID:3180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"72⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN73⤵
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"74⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN75⤵PID:960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"76⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN77⤵PID:3200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"78⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN79⤵
- System Location Discovery: System Language Discovery
PID:1112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"80⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN81⤵PID:876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"82⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN83⤵PID:1064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"84⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN85⤵
- System Location Discovery: System Language Discovery
PID:632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"86⤵PID:2988
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN87⤵PID:3428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"88⤵PID:660
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN89⤵PID:2792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"90⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN91⤵PID:2076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"92⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN93⤵
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"94⤵
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN95⤵PID:764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"96⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN97⤵PID:5084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"98⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN99⤵PID:2484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"100⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN101⤵PID:5028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"102⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN103⤵PID:3752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"104⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN105⤵PID:4344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"106⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN107⤵PID:5040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"108⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN109⤵PID:1568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"110⤵PID:2448
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN111⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"112⤵PID:4256
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN113⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"114⤵PID:5032
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN115⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"116⤵
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN117⤵PID:3976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"118⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN119⤵PID:2144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"120⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN.exeC:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN121⤵PID:464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN"122⤵PID:1616
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-