Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe
Resource
win10v2004-20241007-en
General
-
Target
e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe
-
Size
248KB
-
MD5
3896bcc4c20bec2e4063a7ecc90ebe77
-
SHA1
2373285cd429b443a6b633534ba913ecc9124052
-
SHA256
e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7
-
SHA512
3cc57fd7eadbd18ac81c788f4b9bb98e09dd1d0e8b034c6d8c313e97ce29fab9f89e42de781c03c64b92695a36c581ffb96a314bf8b6e1ccf02dd0ba3c170ccd
-
SSDEEP
3072:PbQd+vjei9IACUL4xfG+AzQTTxw9zEVNu/QzQu2lLWJsHYBTfaaC6MG1fWFUa20N:Ucvyi9lMXAzQTTNaZbpiTfaD4fy/28/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (76) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 5 IoCs
Processes:
flow pid Process 33 404 37 404 40 404 41 404 43 404 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
iWMgYMcE.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation iWMgYMcE.exe -
Executes dropped EXE 2 IoCs
Processes:
iWMgYMcE.exeiMIMUMIE.exepid Process 2532 iWMgYMcE.exe 4276 iMIMUMIE.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeiWMgYMcE.exeiMIMUMIE.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iWMgYMcE.exe = "C:\\Users\\Admin\\RGEgcQYE\\iWMgYMcE.exe" e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iMIMUMIE.exe = "C:\\ProgramData\\pqcQUQkg\\iMIMUMIE.exe" e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iWMgYMcE.exe = "C:\\Users\\Admin\\RGEgcQYE\\iWMgYMcE.exe" iWMgYMcE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iMIMUMIE.exe = "C:\\ProgramData\\pqcQUQkg\\iMIMUMIE.exe" iMIMUMIE.exe -
Drops file in System32 directory 2 IoCs
Processes:
iWMgYMcE.exedescription ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe iWMgYMcE.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe iWMgYMcE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exereg.execmd.exereg.execmd.execmd.exereg.execmd.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exereg.execscript.exereg.exereg.execmd.exereg.exereg.exereg.execmd.execmd.exereg.execmd.exereg.execmd.execmd.execmd.execmd.execmd.exereg.execscript.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exereg.execscript.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.execscript.execscript.exereg.exereg.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.execmd.execscript.exereg.exereg.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.execmd.exereg.execscript.exereg.exereg.execmd.exereg.execmd.exereg.exereg.execmd.exereg.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.execscript.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid Process 5028 reg.exe 2988 reg.exe 4920 reg.exe 3716 reg.exe 3684 reg.exe 4864 reg.exe 2276 reg.exe 1568 reg.exe 2420 reg.exe 4244 reg.exe 4896 reg.exe 4028 reg.exe 1656 reg.exe 4972 reg.exe 1216 reg.exe 3692 reg.exe 4284 reg.exe 4372 reg.exe 2224 reg.exe 3056 reg.exe 3672 reg.exe 3384 reg.exe 2488 reg.exe 3708 reg.exe 1496 reg.exe 2032 reg.exe 4360 reg.exe 4776 reg.exe 4908 reg.exe 1732 reg.exe 4932 reg.exe 732 reg.exe 1656 reg.exe 5032 reg.exe 3284 reg.exe 2832 reg.exe 1232 reg.exe 5096 reg.exe 4768 reg.exe 4904 reg.exe 820 reg.exe 5020 reg.exe 1672 reg.exe 2436 reg.exe 4656 reg.exe 3728 reg.exe 1964 reg.exe 4108 4044 reg.exe 2612 reg.exe 3288 reg.exe 2976 2900 reg.exe 3560 reg.exe 4680 reg.exe 5024 reg.exe 4436 reg.exe 5020 reg.exe 4156 reg.exe 4540 reg.exe 636 reg.exe 1692 reg.exe 3720 reg.exe 4028 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exepid Process 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4976 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4976 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4976 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4976 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4864 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4864 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4864 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4864 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4388 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4388 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4388 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4388 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2100 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2100 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2100 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2100 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4564 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4564 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4564 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4564 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2732 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2732 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2732 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2732 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2348 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2348 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2348 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 2348 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3232 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3232 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3232 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3232 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3592 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3592 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3592 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3592 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3632 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3632 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3632 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 3632 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1888 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1888 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1888 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1888 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4872 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4872 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4872 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 4872 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1224 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1224 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1224 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 1224 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iWMgYMcE.exepid Process 2532 iWMgYMcE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
iWMgYMcE.exepid Process 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe 2532 iWMgYMcE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.execmd.execmd.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.execmd.execmd.exee14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.execmd.exedescription pid Process procid_target PID 2372 wrote to memory of 2532 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 85 PID 2372 wrote to memory of 2532 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 85 PID 2372 wrote to memory of 2532 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 85 PID 2372 wrote to memory of 4276 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 86 PID 2372 wrote to memory of 4276 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 86 PID 2372 wrote to memory of 4276 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 86 PID 2372 wrote to memory of 4672 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 87 PID 2372 wrote to memory of 4672 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 87 PID 2372 wrote to memory of 4672 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 87 PID 2372 wrote to memory of 1392 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 89 PID 2372 wrote to memory of 1392 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 89 PID 2372 wrote to memory of 1392 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 89 PID 2372 wrote to memory of 1612 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 90 PID 2372 wrote to memory of 1612 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 90 PID 2372 wrote to memory of 1612 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 90 PID 2372 wrote to memory of 4456 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 91 PID 2372 wrote to memory of 4456 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 91 PID 2372 wrote to memory of 4456 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 91 PID 2372 wrote to memory of 3468 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 92 PID 2372 wrote to memory of 3468 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 92 PID 2372 wrote to memory of 3468 2372 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 92 PID 4672 wrote to memory of 520 4672 cmd.exe 95 PID 4672 wrote to memory of 520 4672 cmd.exe 95 PID 4672 wrote to memory of 520 4672 cmd.exe 95 PID 3468 wrote to memory of 2636 3468 cmd.exe 98 PID 3468 wrote to memory of 2636 3468 cmd.exe 98 PID 3468 wrote to memory of 2636 3468 cmd.exe 98 PID 520 wrote to memory of 2148 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 99 PID 520 wrote to memory of 2148 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 99 PID 520 wrote to memory of 2148 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 99 PID 2148 wrote to memory of 1284 2148 cmd.exe 101 PID 2148 wrote to memory of 1284 2148 cmd.exe 101 PID 2148 wrote to memory of 1284 2148 cmd.exe 101 PID 520 wrote to memory of 2360 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 102 PID 520 wrote to memory of 2360 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 102 PID 520 wrote to memory of 2360 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 102 PID 520 wrote to memory of 4076 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 103 PID 520 wrote to memory of 4076 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 103 PID 520 wrote to memory of 4076 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 103 PID 520 wrote to memory of 2488 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 104 PID 520 wrote to memory of 2488 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 104 PID 520 wrote to memory of 2488 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 104 PID 520 wrote to memory of 716 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 105 PID 520 wrote to memory of 716 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 105 PID 520 wrote to memory of 716 520 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 105 PID 716 wrote to memory of 3148 716 cmd.exe 110 PID 716 wrote to memory of 3148 716 cmd.exe 110 PID 716 wrote to memory of 3148 716 cmd.exe 110 PID 1284 wrote to memory of 1544 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 111 PID 1284 wrote to memory of 1544 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 111 PID 1284 wrote to memory of 1544 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 111 PID 1544 wrote to memory of 4976 1544 cmd.exe 113 PID 1544 wrote to memory of 4976 1544 cmd.exe 113 PID 1544 wrote to memory of 4976 1544 cmd.exe 113 PID 1284 wrote to memory of 560 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 114 PID 1284 wrote to memory of 560 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 114 PID 1284 wrote to memory of 560 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 114 PID 1284 wrote to memory of 3012 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 115 PID 1284 wrote to memory of 3012 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 115 PID 1284 wrote to memory of 3012 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 115 PID 1284 wrote to memory of 4044 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 116 PID 1284 wrote to memory of 4044 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 116 PID 1284 wrote to memory of 4044 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 116 PID 1284 wrote to memory of 3096 1284 e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe"C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\RGEgcQYE\iWMgYMcE.exe"C:\Users\Admin\RGEgcQYE\iWMgYMcE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2532
-
-
C:\ProgramData\pqcQUQkg\iMIMUMIE.exe"C:\ProgramData\pqcQUQkg\iMIMUMIE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"2⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf73⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"4⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf75⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"6⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf77⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"8⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf79⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"10⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf711⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"12⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf713⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"14⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf715⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"16⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf717⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"18⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf719⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"20⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf721⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"22⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf723⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"24⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf725⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"26⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf727⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"28⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf729⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"30⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf731⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"32⤵
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf733⤵PID:4840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"34⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf735⤵PID:5096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"36⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf737⤵PID:696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"38⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf739⤵
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"40⤵PID:780
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf741⤵PID:3004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"42⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf743⤵PID:404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"44⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf745⤵PID:1824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"46⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf747⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"48⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf749⤵PID:4484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"50⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf751⤵PID:3792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"52⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf753⤵PID:3096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"54⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf755⤵PID:3716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"56⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf757⤵PID:2636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"58⤵
- System Location Discovery: System Language Discovery
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf759⤵PID:788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"60⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf761⤵PID:1296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"62⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf763⤵PID:5036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"64⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf765⤵PID:4856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"66⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf767⤵PID:3612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"68⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf769⤵PID:2364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"70⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf771⤵PID:3340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"72⤵PID:2696
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf773⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"74⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf775⤵
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"76⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf777⤵PID:2228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"78⤵PID:4616
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf779⤵PID:3736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"80⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf781⤵PID:1612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"82⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf783⤵PID:468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"84⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf785⤵PID:2900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"86⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf787⤵PID:2972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"88⤵
- System Location Discovery: System Language Discovery
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf789⤵PID:1744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"90⤵PID:3240
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf791⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"92⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf793⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"94⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf795⤵PID:2564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"96⤵PID:5100
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf797⤵PID:2040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"98⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf799⤵PID:2632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"100⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7101⤵PID:4856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"102⤵
- System Location Discovery: System Language Discovery
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7103⤵PID:2056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"104⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7105⤵PID:1424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"106⤵
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7107⤵PID:2164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"108⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7109⤵PID:2684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"110⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7111⤵PID:2360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"112⤵PID:4952
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7113⤵PID:3772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"114⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7115⤵PID:3568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"116⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7117⤵PID:2696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"118⤵PID:4432
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7119⤵PID:4844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"120⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7.exeC:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7121⤵PID:684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\e14d792db4de3d81045a021a62eb4a137404c254531bc7e35ca567fe96fedcf7"122⤵PID:4448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-