Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
166s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe
Resource
win10v2004-20220812-en
General
-
Target
b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe
-
Size
491KB
-
MD5
66ab374f3df96bf4e1f471d50b6d67a0
-
SHA1
cc35340e17e2adb066f1cfe58d2d194d0a87c2f2
-
SHA256
b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a
-
SHA512
5e953c2ba7d1a090ef5661e1d8768de93b932df466578d89fa3fa3eebb00bccaf70c3246e92edbf4bf0eca8574524818c1802f9d676ee84ab94ab5e086a515db
-
SSDEEP
12288:mlHkkfPV9Ba2JiyC4bniHx7l9hRabnTWhx8U8z:mikfzBafyCg0l9Puahx2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\XcskMggo\\qCgwkYQg.exe," b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\XcskMggo\\qCgwkYQg.exe," b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 5004 goYMkcco.exe 3668 qCgwkYQg.exe 1108 IGkIUQkM.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation qCgwkYQg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goYMkcco.exe = "C:\\Users\\Admin\\SUosgkIU\\goYMkcco.exe" b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\goYMkcco.exe = "C:\\Users\\Admin\\SUosgkIU\\goYMkcco.exe" goYMkcco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qCgwkYQg.exe = "C:\\ProgramData\\XcskMggo\\qCgwkYQg.exe" b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qCgwkYQg.exe = "C:\\ProgramData\\XcskMggo\\qCgwkYQg.exe" qCgwkYQg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qCgwkYQg.exe = "C:\\ProgramData\\XcskMggo\\qCgwkYQg.exe" IGkIUQkM.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheDisableWrite.png qCgwkYQg.exe File opened for modification C:\Windows\SysWOW64\sheImportFormat.zip qCgwkYQg.exe File opened for modification C:\Windows\SysWOW64\sheSwitchConnect.docx qCgwkYQg.exe File opened for modification C:\Windows\SysWOW64\sheUninstallPush.png qCgwkYQg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\SUosgkIU IGkIUQkM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\SUosgkIU\goYMkcco IGkIUQkM.exe File created C:\Windows\SysWOW64\shell32.dll.exe qCgwkYQg.exe File opened for modification C:\Windows\SysWOW64\sheConvertFromRename.ppt qCgwkYQg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2860 reg.exe 5040 reg.exe 4060 reg.exe 1816 reg.exe 1580 reg.exe 3588 reg.exe 4088 reg.exe 2268 reg.exe 4244 reg.exe 1508 reg.exe 4060 reg.exe 4720 reg.exe 2368 reg.exe 4576 reg.exe 2432 reg.exe 1676 reg.exe 1144 reg.exe 3604 reg.exe 800 reg.exe 3236 reg.exe 4344 reg.exe 4056 reg.exe 3488 reg.exe 3296 reg.exe 2400 reg.exe 4460 reg.exe 4784 reg.exe 1328 reg.exe 424 reg.exe 1940 reg.exe 4228 reg.exe 2720 reg.exe 4192 reg.exe 956 reg.exe 4444 reg.exe 380 reg.exe 2084 reg.exe 4232 reg.exe 112 reg.exe 956 reg.exe 3324 reg.exe 4784 reg.exe 2116 reg.exe 3204 reg.exe 3092 reg.exe 1536 reg.exe 1688 reg.exe 2256 reg.exe 112 reg.exe 908 reg.exe 388 reg.exe 1904 reg.exe 2460 reg.exe 3416 reg.exe 1064 reg.exe 3536 reg.exe 444 reg.exe 1100 reg.exe 2528 reg.exe 1420 reg.exe 5000 reg.exe 3712 reg.exe 956 reg.exe 1852 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 3080 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 3080 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 3080 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 3080 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2528 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2528 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2528 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2528 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 632 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 632 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 632 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 632 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2364 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2364 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2364 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2364 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2988 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2988 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2988 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2988 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 3736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 3736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 3736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 3736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 1032 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 1032 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 1032 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 1032 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2040 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2040 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2040 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 2040 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4076 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4076 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4076 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4076 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4280 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4280 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4280 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4280 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4132 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4132 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4132 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4132 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4584 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4584 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4584 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4584 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4792 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4792 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4792 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 4792 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3668 qCgwkYQg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe 3668 qCgwkYQg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 5004 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 81 PID 5052 wrote to memory of 5004 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 81 PID 5052 wrote to memory of 5004 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 81 PID 5052 wrote to memory of 3668 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 82 PID 5052 wrote to memory of 3668 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 82 PID 5052 wrote to memory of 3668 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 82 PID 5052 wrote to memory of 1180 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 84 PID 5052 wrote to memory of 1180 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 84 PID 5052 wrote to memory of 1180 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 84 PID 1180 wrote to memory of 1736 1180 cmd.exe 86 PID 1180 wrote to memory of 1736 1180 cmd.exe 86 PID 1180 wrote to memory of 1736 1180 cmd.exe 86 PID 5052 wrote to memory of 2256 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 87 PID 5052 wrote to memory of 2256 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 87 PID 5052 wrote to memory of 2256 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 87 PID 5052 wrote to memory of 4736 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 88 PID 5052 wrote to memory of 4736 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 88 PID 5052 wrote to memory of 4736 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 88 PID 5052 wrote to memory of 1972 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 90 PID 5052 wrote to memory of 1972 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 90 PID 5052 wrote to memory of 1972 5052 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 90 PID 1736 wrote to memory of 4396 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 93 PID 1736 wrote to memory of 4396 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 93 PID 1736 wrote to memory of 4396 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 93 PID 4396 wrote to memory of 536 4396 cmd.exe 95 PID 4396 wrote to memory of 536 4396 cmd.exe 95 PID 4396 wrote to memory of 536 4396 cmd.exe 95 PID 1736 wrote to memory of 3228 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 96 PID 1736 wrote to memory of 3228 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 96 PID 1736 wrote to memory of 3228 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 96 PID 1736 wrote to memory of 716 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 98 PID 1736 wrote to memory of 716 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 98 PID 1736 wrote to memory of 716 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 98 PID 1736 wrote to memory of 3912 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 100 PID 1736 wrote to memory of 3912 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 100 PID 1736 wrote to memory of 3912 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 100 PID 1736 wrote to memory of 912 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 102 PID 1736 wrote to memory of 912 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 102 PID 1736 wrote to memory of 912 1736 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 102 PID 536 wrote to memory of 2436 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 104 PID 536 wrote to memory of 2436 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 104 PID 536 wrote to memory of 2436 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 104 PID 2436 wrote to memory of 3080 2436 cmd.exe 106 PID 2436 wrote to memory of 3080 2436 cmd.exe 106 PID 2436 wrote to memory of 3080 2436 cmd.exe 106 PID 536 wrote to memory of 3152 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 107 PID 536 wrote to memory of 3152 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 107 PID 536 wrote to memory of 3152 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 107 PID 536 wrote to memory of 4492 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 108 PID 536 wrote to memory of 4492 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 108 PID 536 wrote to memory of 4492 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 108 PID 536 wrote to memory of 3016 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 110 PID 536 wrote to memory of 3016 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 110 PID 536 wrote to memory of 3016 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 110 PID 536 wrote to memory of 4924 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 111 PID 536 wrote to memory of 4924 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 111 PID 536 wrote to memory of 4924 536 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 111 PID 3080 wrote to memory of 3144 3080 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 115 PID 3080 wrote to memory of 3144 3080 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 115 PID 3080 wrote to memory of 3144 3080 b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe 115 PID 4924 wrote to memory of 1884 4924 cmd.exe 117 PID 4924 wrote to memory of 1884 4924 cmd.exe 117 PID 4924 wrote to memory of 1884 4924 cmd.exe 117 PID 912 wrote to memory of 3272 912 cmd.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe"C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\SUosgkIU\goYMkcco.exe"C:\Users\Admin\SUosgkIU\goYMkcco.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5004
-
-
C:\ProgramData\XcskMggo\qCgwkYQg.exe"C:\ProgramData\XcskMggo\qCgwkYQg.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"2⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"4⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"6⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"8⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"10⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a11⤵
- Suspicious behavior: EnumeratesProcesses
PID:632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"12⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"14⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"16⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"18⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"20⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"22⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"24⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"26⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"28⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"30⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"32⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a33⤵PID:3316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"34⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a35⤵PID:4824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"36⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a37⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"38⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a39⤵PID:4072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"40⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a41⤵PID:5060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"42⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a43⤵PID:1536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"44⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a45⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"46⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a47⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"48⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a49⤵PID:3536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"50⤵PID:716
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a51⤵PID:4532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"52⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a53⤵PID:2860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"54⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a55⤵PID:4720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"56⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a57⤵PID:1484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"58⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a59⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"60⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a61⤵PID:3536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"62⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a63⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"64⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a65⤵PID:1808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"66⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a67⤵PID:4016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"68⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a69⤵PID:4924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"70⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a71⤵PID:1052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"72⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a73⤵PID:2412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"74⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a75⤵PID:4432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"76⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a77⤵PID:2268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"78⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a79⤵PID:4116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"80⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a81⤵PID:5116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"82⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a83⤵PID:3560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"84⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a85⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"86⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a87⤵PID:2540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"88⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a89⤵PID:4736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"90⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a91⤵PID:3736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"92⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a93⤵PID:2496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"94⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a95⤵PID:1144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"96⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a97⤵PID:3996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"98⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a99⤵PID:2556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"100⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a101⤵PID:4072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"102⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a103⤵PID:524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"104⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a105⤵PID:2972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"106⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a107⤵PID:4524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"108⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a109⤵PID:4300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"110⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a111⤵PID:1640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"112⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a113⤵PID:1308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"114⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a115⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"116⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a117⤵PID:3736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"118⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a119⤵PID:1628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"120⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a.exeC:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a121⤵PID:536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\b2e11f3d169e554a69f6a457cc4629f75eae8b49c5e745f56546c248f140697a"122⤵PID:1588
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-