Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe
Resource
win10v2004-20220812-en
General
-
Target
19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe
-
Size
524KB
-
MD5
82d53ea60db2054be732976b27171110
-
SHA1
7b16dab41a0513d39638928131306eb0720c40e6
-
SHA256
19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee
-
SHA512
cd689a4d26103487bafbfcf20871e14988b8effd3158dbf6847aa0a7d9a9289d84dc3933c08042be0580d6101b16c65f7406f6b0a4a6de08109af47181fb9987
-
SSDEEP
12288:oDc/RxkurT41MhWI40TGHGO60NQzYtugp0pfUbWK0C3TC3zk:b4Gi6GHXNQzYtugn/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\vsMkoQsc\\CYQUoccs.exe,C:\\ProgramData\\diIsEgMY\\BKkkgMUY.exe," 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\vsMkoQsc\\CYQUoccs.exe,C:\\ProgramData\\diIsEgMY\\BKkkgMUY.exe," 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\vsMkoQsc\\CYQUoccs.exe," 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\vsMkoQsc\\CYQUoccs.exe," 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 5016 DQgAYIQQ.exe 5048 CYQUoccs.exe 3232 YAYEoAYs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation CYQUoccs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BKkkgMUY.exe = "C:\\ProgramData\\diIsEgMY\\BKkkgMUY.exe" 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DQgAYIQQ.exe = "C:\\Users\\Admin\\wCAAcwss\\DQgAYIQQ.exe" 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CYQUoccs.exe = "C:\\ProgramData\\vsMkoQsc\\CYQUoccs.exe" 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DQgAYIQQ.exe = "C:\\Users\\Admin\\wCAAcwss\\DQgAYIQQ.exe" DQgAYIQQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CYQUoccs.exe = "C:\\ProgramData\\vsMkoQsc\\CYQUoccs.exe" CYQUoccs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CYQUoccs.exe = "C:\\ProgramData\\vsMkoQsc\\CYQUoccs.exe" YAYEoAYs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OWcEgAUk.exe = "C:\\Users\\Admin\\fksIMMsw\\OWcEgAUk.exe" 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\wCAAcwss YAYEoAYs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\wCAAcwss\DQgAYIQQ YAYEoAYs.exe File created C:\Windows\SysWOW64\shell32.dll.exe CYQUoccs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4900 3328 WerFault.exe 1437 224 4092 WerFault.exe 1435 772 4824 WerFault.exe 1436 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 756 reg.exe 4964 reg.exe 2388 reg.exe 3156 reg.exe 4140 reg.exe 2816 reg.exe 208 reg.exe 4516 reg.exe 1276 reg.exe 3212 reg.exe 4552 reg.exe 4520 reg.exe 1512 reg.exe 4500 reg.exe 4316 reg.exe 3016 reg.exe 1224 reg.exe 4840 reg.exe 2272 reg.exe 4568 reg.exe 2800 reg.exe 3224 reg.exe 5088 reg.exe 1960 reg.exe 3216 reg.exe 1428 reg.exe 2356 reg.exe 4732 reg.exe 5036 reg.exe 4964 reg.exe 2032 reg.exe 3396 reg.exe 1288 reg.exe 3588 reg.exe 1876 reg.exe 1792 reg.exe 4676 reg.exe 1648 reg.exe 4848 reg.exe 2812 reg.exe 4340 reg.exe 1412 reg.exe 3448 reg.exe 4812 reg.exe 224 reg.exe 4704 reg.exe 3356 reg.exe 1564 reg.exe 536 reg.exe 2816 reg.exe 3972 reg.exe 3932 reg.exe 1788 reg.exe 1264 reg.exe 1380 reg.exe 2492 reg.exe 2492 reg.exe 3344 reg.exe 3172 reg.exe 3976 reg.exe 4532 reg.exe 4752 reg.exe 1048 reg.exe 2832 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4512 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4512 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4512 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4512 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1484 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1484 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1484 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1484 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1432 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1432 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1432 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1432 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1460 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1460 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1460 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1460 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2032 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2032 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2032 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2032 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4864 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4864 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4864 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4864 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4596 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4596 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4596 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4596 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2756 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2756 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2756 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2756 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1432 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1432 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1432 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 1432 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4276 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4276 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4276 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4276 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2288 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2288 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2288 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 2288 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 216 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 216 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 216 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 216 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4772 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4772 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4772 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 4772 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5048 CYQUoccs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe 5048 CYQUoccs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 5016 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 79 PID 2424 wrote to memory of 5016 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 79 PID 2424 wrote to memory of 5016 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 79 PID 2424 wrote to memory of 5048 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 80 PID 2424 wrote to memory of 5048 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 80 PID 2424 wrote to memory of 5048 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 80 PID 2424 wrote to memory of 4312 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 82 PID 2424 wrote to memory of 4312 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 82 PID 2424 wrote to memory of 4312 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 82 PID 2424 wrote to memory of 4308 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 83 PID 2424 wrote to memory of 4308 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 83 PID 2424 wrote to memory of 4308 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 83 PID 2424 wrote to memory of 4276 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 84 PID 2424 wrote to memory of 4276 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 84 PID 2424 wrote to memory of 4276 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 84 PID 2424 wrote to memory of 2800 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 85 PID 2424 wrote to memory of 2800 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 85 PID 2424 wrote to memory of 2800 2424 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 85 PID 4312 wrote to memory of 748 4312 cmd.exe 90 PID 4312 wrote to memory of 748 4312 cmd.exe 90 PID 4312 wrote to memory of 748 4312 cmd.exe 90 PID 748 wrote to memory of 100 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 91 PID 748 wrote to memory of 100 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 91 PID 748 wrote to memory of 100 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 91 PID 100 wrote to memory of 4784 100 cmd.exe 93 PID 100 wrote to memory of 4784 100 cmd.exe 93 PID 100 wrote to memory of 4784 100 cmd.exe 93 PID 748 wrote to memory of 4316 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 94 PID 748 wrote to memory of 4316 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 94 PID 748 wrote to memory of 4316 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 94 PID 748 wrote to memory of 2492 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 96 PID 748 wrote to memory of 2492 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 96 PID 748 wrote to memory of 2492 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 96 PID 748 wrote to memory of 1692 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 98 PID 748 wrote to memory of 1692 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 98 PID 748 wrote to memory of 1692 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 98 PID 748 wrote to memory of 2004 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 100 PID 748 wrote to memory of 2004 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 100 PID 748 wrote to memory of 2004 748 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 100 PID 4784 wrote to memory of 4228 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 102 PID 4784 wrote to memory of 4228 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 102 PID 4784 wrote to memory of 4228 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 102 PID 4784 wrote to memory of 2052 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 104 PID 4784 wrote to memory of 2052 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 104 PID 4784 wrote to memory of 2052 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 104 PID 4784 wrote to memory of 440 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 106 PID 4784 wrote to memory of 440 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 106 PID 4784 wrote to memory of 440 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 106 PID 4784 wrote to memory of 3348 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 107 PID 4784 wrote to memory of 3348 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 107 PID 4784 wrote to memory of 3348 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 107 PID 4228 wrote to memory of 4512 4228 cmd.exe 108 PID 4228 wrote to memory of 4512 4228 cmd.exe 108 PID 4228 wrote to memory of 4512 4228 cmd.exe 108 PID 4784 wrote to memory of 952 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 111 PID 4784 wrote to memory of 952 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 111 PID 4784 wrote to memory of 952 4784 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 111 PID 2004 wrote to memory of 3588 2004 cmd.exe 114 PID 2004 wrote to memory of 3588 2004 cmd.exe 114 PID 2004 wrote to memory of 3588 2004 cmd.exe 114 PID 952 wrote to memory of 3876 952 cmd.exe 113 PID 952 wrote to memory of 3876 952 cmd.exe 113 PID 952 wrote to memory of 3876 952 cmd.exe 113 PID 4512 wrote to memory of 1564 4512 19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe"C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\wCAAcwss\DQgAYIQQ.exe"C:\Users\Admin\wCAAcwss\DQgAYIQQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5016
-
-
C:\ProgramData\vsMkoQsc\CYQUoccs.exe"C:\ProgramData\vsMkoQsc\CYQUoccs.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:5048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"2⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"4⤵
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"6⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"8⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"10⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"12⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"14⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"16⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"18⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"20⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"22⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"24⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"26⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"28⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee29⤵
- Suspicious behavior: EnumeratesProcesses
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"30⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"32⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee33⤵PID:1012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"34⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee35⤵PID:1120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"36⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee37⤵PID:3000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"38⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee39⤵PID:3568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"40⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee41⤵PID:3560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"42⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee43⤵PID:1084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"44⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee45⤵PID:224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"46⤵PID:508
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee47⤵PID:1564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"48⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee49⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"50⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee51⤵PID:928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"52⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee53⤵PID:3976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"54⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee55⤵PID:1400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"56⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee57⤵PID:4568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"58⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee59⤵PID:1996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"60⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee61⤵PID:2844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"62⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee63⤵PID:388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"64⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee65⤵PID:3392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"66⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee67⤵PID:2288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"68⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee69⤵PID:4492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"70⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee71⤵PID:2636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"72⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee73⤵PID:3984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"74⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee75⤵PID:828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"76⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee77⤵PID:2064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"78⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee79⤵PID:3672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"80⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee81⤵PID:3896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"82⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee83⤵PID:3380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"84⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee85⤵PID:624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"86⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee87⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"88⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee89⤵PID:4932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"90⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee91⤵PID:2596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"92⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee93⤵PID:3104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"94⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee95⤵PID:384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"96⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee97⤵PID:1684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"98⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee99⤵PID:3892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"100⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee101⤵PID:2564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"102⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee103⤵PID:2496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"104⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee105⤵PID:1272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"106⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee107⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"108⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee109⤵PID:3752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"110⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee111⤵PID:672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"112⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee113⤵PID:3368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"114⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee115⤵PID:928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"116⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee117⤵PID:5084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"118⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee119⤵PID:1576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"120⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee.exeC:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee121⤵PID:728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19480efc82f9d520c52905cef3467d4eacd6557915bb1e3574fbdfaf08b1ccee"122⤵PID:4056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-