Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe
Resource
win10v2004-20220901-en
General
-
Target
c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe
-
Size
499KB
-
MD5
64e832aaf4aa94bfb4b06da5d0caadb0
-
SHA1
267e7c0fd1c010dfb9df69afef0a7d3bd2814b21
-
SHA256
c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215
-
SHA512
7905b6fec216f8480658a8a1990e1d4b5955dd85c4827a01508fda111a5a3b065df5cf0b5bb5418b3828691d35f79d680d5b54298394897ab906d5eaf1e66b2e
-
SSDEEP
12288:r7Ft+KGGOznJDlXmEUchDVz9d9YUTckKjkGso:EDWEUcFnd9DT2J
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\faAkkYEw\\oioosMgo.exe," c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\faAkkYEw\\oioosMgo.exe," c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 61 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 1952 qaswcYAs.exe 1528 oioosMgo.exe 3436 WWooQsQI.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation qaswcYAs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qaswcYAs.exe = "C:\\Users\\Admin\\bigcAkAs\\qaswcYAs.exe" c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oioosMgo.exe = "C:\\ProgramData\\faAkkYEw\\oioosMgo.exe" c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qaswcYAs.exe = "C:\\Users\\Admin\\bigcAkAs\\qaswcYAs.exe" qaswcYAs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oioosMgo.exe = "C:\\ProgramData\\faAkkYEw\\oioosMgo.exe" oioosMgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oioosMgo.exe = "C:\\ProgramData\\faAkkYEw\\oioosMgo.exe" WWooQsQI.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheSelectRestore.mpg qaswcYAs.exe File opened for modification C:\Windows\SysWOW64\sheUnregisterFind.wma qaswcYAs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\bigcAkAs WWooQsQI.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\bigcAkAs\qaswcYAs WWooQsQI.exe File created C:\Windows\SysWOW64\shell32.dll.exe qaswcYAs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4300 reg.exe 4948 reg.exe 2744 reg.exe 4816 reg.exe 2304 reg.exe 388 reg.exe 4120 reg.exe 1124 reg.exe 4264 reg.exe 2528 reg.exe 2128 reg.exe 4436 reg.exe 2276 reg.exe 2332 reg.exe 4652 reg.exe 60 reg.exe 4684 reg.exe 3452 reg.exe 3696 reg.exe 4856 reg.exe 4300 reg.exe 3836 reg.exe 3112 reg.exe 3064 reg.exe 620 reg.exe 748 reg.exe 3080 reg.exe 1288 reg.exe 2440 reg.exe 5112 reg.exe 4868 reg.exe 2672 reg.exe 864 reg.exe 372 reg.exe 2752 reg.exe 1016 reg.exe 3196 reg.exe 4252 reg.exe 3292 reg.exe 3848 reg.exe 1432 reg.exe 1348 reg.exe 3728 reg.exe 2008 reg.exe 4652 reg.exe 4628 reg.exe 2296 reg.exe 4156 reg.exe 4172 reg.exe 4672 reg.exe 4124 reg.exe 2304 reg.exe 1832 reg.exe 900 reg.exe 3992 reg.exe 4560 reg.exe 3012 reg.exe 620 reg.exe 3928 reg.exe 1124 reg.exe 1316 reg.exe 5008 reg.exe 5028 reg.exe 4856 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4552 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4552 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4552 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4552 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 64 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 64 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 64 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 64 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 1928 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 1928 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 1928 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 1928 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4736 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4736 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4736 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4736 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 964 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 964 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 964 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 964 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 1432 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 1432 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 1432 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 1432 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 3616 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 3616 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 3616 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 3616 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 804 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 804 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 804 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 804 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4748 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4748 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4748 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 4748 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 748 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 748 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 748 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 748 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 3124 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 3124 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 3124 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 3124 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 3588 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 3588 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 3588 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 3588 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 1868 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 1868 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 1868 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 1868 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1952 qaswcYAs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe 1952 qaswcYAs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1952 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 84 PID 2104 wrote to memory of 1952 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 84 PID 2104 wrote to memory of 1952 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 84 PID 2104 wrote to memory of 1528 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 85 PID 2104 wrote to memory of 1528 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 85 PID 2104 wrote to memory of 1528 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 85 PID 2104 wrote to memory of 4032 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 87 PID 2104 wrote to memory of 4032 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 87 PID 2104 wrote to memory of 4032 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 87 PID 2104 wrote to memory of 3080 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 90 PID 2104 wrote to memory of 3080 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 90 PID 2104 wrote to memory of 3080 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 90 PID 4032 wrote to memory of 4244 4032 cmd.exe 89 PID 4032 wrote to memory of 4244 4032 cmd.exe 89 PID 4032 wrote to memory of 4244 4032 cmd.exe 89 PID 2104 wrote to memory of 4852 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 91 PID 2104 wrote to memory of 4852 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 91 PID 2104 wrote to memory of 4852 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 91 PID 2104 wrote to memory of 3580 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 92 PID 2104 wrote to memory of 3580 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 92 PID 2104 wrote to memory of 3580 2104 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 92 PID 4244 wrote to memory of 2720 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 96 PID 4244 wrote to memory of 2720 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 96 PID 4244 wrote to memory of 2720 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 96 PID 4244 wrote to memory of 1288 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 97 PID 4244 wrote to memory of 1288 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 97 PID 4244 wrote to memory of 1288 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 97 PID 4244 wrote to memory of 4160 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 98 PID 4244 wrote to memory of 4160 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 98 PID 4244 wrote to memory of 4160 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 98 PID 4244 wrote to memory of 5084 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 100 PID 4244 wrote to memory of 5084 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 100 PID 4244 wrote to memory of 5084 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 100 PID 4244 wrote to memory of 4304 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 99 PID 4244 wrote to memory of 4304 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 99 PID 4244 wrote to memory of 4304 4244 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 99 PID 2720 wrote to memory of 376 2720 cmd.exe 106 PID 2720 wrote to memory of 376 2720 cmd.exe 106 PID 2720 wrote to memory of 376 2720 cmd.exe 106 PID 4304 wrote to memory of 4080 4304 cmd.exe 107 PID 4304 wrote to memory of 4080 4304 cmd.exe 107 PID 4304 wrote to memory of 4080 4304 cmd.exe 107 PID 376 wrote to memory of 2476 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 108 PID 376 wrote to memory of 2476 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 108 PID 376 wrote to memory of 2476 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 108 PID 376 wrote to memory of 1848 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 110 PID 376 wrote to memory of 1848 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 110 PID 376 wrote to memory of 1848 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 110 PID 376 wrote to memory of 4252 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 112 PID 376 wrote to memory of 4252 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 112 PID 376 wrote to memory of 4252 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 112 PID 376 wrote to memory of 2116 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 114 PID 376 wrote to memory of 2116 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 114 PID 376 wrote to memory of 2116 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 114 PID 376 wrote to memory of 3336 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 116 PID 376 wrote to memory of 3336 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 116 PID 376 wrote to memory of 3336 376 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 116 PID 2476 wrote to memory of 4552 2476 cmd.exe 119 PID 2476 wrote to memory of 4552 2476 cmd.exe 119 PID 2476 wrote to memory of 4552 2476 cmd.exe 119 PID 3336 wrote to memory of 3460 3336 cmd.exe 118 PID 3336 wrote to memory of 3460 3336 cmd.exe 118 PID 3336 wrote to memory of 3460 3336 cmd.exe 118 PID 4552 wrote to memory of 4884 4552 c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe"C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\bigcAkAs\qaswcYAs.exe"C:\Users\Admin\bigcAkAs\qaswcYAs.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1952
-
-
C:\ProgramData\faAkkYEw\oioosMgo.exe"C:\ProgramData\faAkkYEw\oioosMgo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"2⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e2153⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"4⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e2155⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"6⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e2157⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"8⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e2159⤵
- Suspicious behavior: EnumeratesProcesses
PID:64 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"10⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21511⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"12⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21513⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"14⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21515⤵
- Suspicious behavior: EnumeratesProcesses
PID:964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"16⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21517⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"18⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21519⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"20⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21521⤵
- Suspicious behavior: EnumeratesProcesses
PID:804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"22⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21523⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"24⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21525⤵
- Suspicious behavior: EnumeratesProcesses
PID:748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"26⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21527⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"28⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21529⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"30⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21531⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"32⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21533⤵PID:2308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"34⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21535⤵PID:1288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"36⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21537⤵PID:3260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"38⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21539⤵PID:4076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"40⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21541⤵PID:1976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"42⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21543⤵PID:3084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"44⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21545⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"46⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21547⤵PID:3092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"48⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21549⤵PID:1080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"50⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21551⤵PID:4108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"52⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21553⤵PID:1836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"54⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21555⤵PID:3336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"56⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21557⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"58⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21559⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"60⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21561⤵PID:3020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"62⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21563⤵PID:2392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"64⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21565⤵PID:3456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"66⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21567⤵PID:1036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"68⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21569⤵PID:2076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"70⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21571⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"72⤵PID:724
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21573⤵PID:4524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"74⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21575⤵PID:800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"76⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21577⤵PID:4492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"78⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21579⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"80⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21581⤵PID:3044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"82⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21583⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"84⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21585⤵PID:2080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"86⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21587⤵PID:1016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"88⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21589⤵PID:2804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"90⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21591⤵PID:2300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"92⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21593⤵PID:1508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"94⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21595⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"96⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21597⤵PID:4300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"98⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e21599⤵PID:3908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"100⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215101⤵PID:3156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"102⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215103⤵PID:5068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"104⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215105⤵PID:4092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"106⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215107⤵PID:3204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"108⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215109⤵PID:4248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"110⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215111⤵PID:1748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"112⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215113⤵PID:3456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"114⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215115⤵PID:528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"116⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215117⤵PID:4072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"118⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215119⤵PID:3100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"120⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215.exeC:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215121⤵PID:4448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c0454123be71623cf0f54d69931613db919f4dcbe40f1ff0fa66e8d77fe5e215"122⤵PID:620
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-