Analysis
-
max time kernel
186s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 02:09
Static task
static1
Behavioral task
behavioral1
Sample
c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe
Resource
win10v2004-20220812-en
General
-
Target
c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe
-
Size
493KB
-
MD5
92f95308b8391412431ff90e73b480e0
-
SHA1
199133998ce838f138a3fc628a35c42ae3503e51
-
SHA256
c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98
-
SHA512
48a3079c31361d4080b90b33c4e95fe0eeefded7689a4610c27f0da79a2ab4730982b6157dc4eb80a3cd521ec95080c509512c3bf320f6b3de4543857fcb09e8
-
SSDEEP
12288:3uJ3pPSKKW4uAfK8s9rUfoTpacMb14sxk:3uCWbAy8s9gQTkcMb1M
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\AawUgwUc\\jOkAcoQs.exe," c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\AawUgwUc\\jOkAcoQs.exe," c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4912 AyoMIMQs.exe 4860 jOkAcoQs.exe 4648 GyEEsckU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AyoMIMQs.exe = "C:\\Users\\Admin\\GKEIUMMc\\AyoMIMQs.exe" c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AyoMIMQs.exe = "C:\\Users\\Admin\\GKEIUMMc\\AyoMIMQs.exe" AyoMIMQs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jOkAcoQs.exe = "C:\\ProgramData\\AawUgwUc\\jOkAcoQs.exe" c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jOkAcoQs.exe = "C:\\ProgramData\\AawUgwUc\\jOkAcoQs.exe" jOkAcoQs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jOkAcoQs.exe = "C:\\ProgramData\\AawUgwUc\\jOkAcoQs.exe" GyEEsckU.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\GKEIUMMc GyEEsckU.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\GKEIUMMc\AyoMIMQs GyEEsckU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 5076 Process not Found 2416 reg.exe 2072 reg.exe 832 reg.exe 4484 Process not Found 4152 Process not Found 3748 reg.exe 988 reg.exe 2600 reg.exe 1780 reg.exe 1632 reg.exe 224 reg.exe 2328 reg.exe 2312 Process not Found 1864 reg.exe 3232 Process not Found 4960 Process not Found 2452 Process not Found 4616 reg.exe 3960 reg.exe 3316 reg.exe 444 reg.exe 4976 Process not Found 2176 Process not Found 2400 reg.exe 3092 reg.exe 3816 reg.exe 4716 reg.exe 3156 reg.exe 3588 reg.exe 3104 reg.exe 4324 reg.exe 3572 Process not Found 1828 reg.exe 3552 reg.exe 2900 Process not Found 3360 Process not Found 692 reg.exe 2668 reg.exe 1408 reg.exe 4280 reg.exe 4336 reg.exe 2080 reg.exe 2496 reg.exe 4716 reg.exe 2432 reg.exe 1680 reg.exe 2132 reg.exe 4676 reg.exe 100 Process not Found 1940 Process not Found 4340 reg.exe 4780 reg.exe 4116 reg.exe 2852 Process not Found 1132 Process not Found 2768 reg.exe 2452 reg.exe 4344 Process not Found 2312 Process not Found 4384 Process not Found 432 Process not Found 3580 reg.exe 3908 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3460 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3460 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3460 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3460 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 2724 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 2724 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 2724 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 2724 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 1432 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 1432 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 1432 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 1432 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3692 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3692 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3692 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3692 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3644 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3644 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3644 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3644 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3096 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3096 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3096 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3096 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 4252 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 4252 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 4252 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 4252 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 692 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 692 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 692 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 692 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 1352 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 1352 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 1352 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 1352 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 1600 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 1600 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 1600 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 1600 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 2328 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 2328 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 2328 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 2328 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3472 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3472 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3472 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 3472 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 2856 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 2856 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 2856 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 2856 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 736 wrote to memory of 4912 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 81 PID 736 wrote to memory of 4912 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 81 PID 736 wrote to memory of 4912 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 81 PID 736 wrote to memory of 4860 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 82 PID 736 wrote to memory of 4860 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 82 PID 736 wrote to memory of 4860 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 82 PID 736 wrote to memory of 1512 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 84 PID 736 wrote to memory of 1512 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 84 PID 736 wrote to memory of 1512 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 84 PID 1512 wrote to memory of 4980 1512 cmd.exe 86 PID 1512 wrote to memory of 4980 1512 cmd.exe 86 PID 1512 wrote to memory of 4980 1512 cmd.exe 86 PID 736 wrote to memory of 3404 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 87 PID 736 wrote to memory of 3404 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 87 PID 736 wrote to memory of 3404 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 87 PID 736 wrote to memory of 640 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 88 PID 736 wrote to memory of 640 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 88 PID 736 wrote to memory of 640 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 88 PID 736 wrote to memory of 3900 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 91 PID 736 wrote to memory of 3900 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 91 PID 736 wrote to memory of 3900 736 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 91 PID 4980 wrote to memory of 1252 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 93 PID 4980 wrote to memory of 1252 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 93 PID 4980 wrote to memory of 1252 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 93 PID 1252 wrote to memory of 3748 1252 cmd.exe 95 PID 1252 wrote to memory of 3748 1252 cmd.exe 95 PID 1252 wrote to memory of 3748 1252 cmd.exe 95 PID 4980 wrote to memory of 1864 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 96 PID 4980 wrote to memory of 1864 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 96 PID 4980 wrote to memory of 1864 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 96 PID 4980 wrote to memory of 3580 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 98 PID 4980 wrote to memory of 3580 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 98 PID 4980 wrote to memory of 3580 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 98 PID 4980 wrote to memory of 4472 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 101 PID 4980 wrote to memory of 4472 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 101 PID 4980 wrote to memory of 4472 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 101 PID 4980 wrote to memory of 2948 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 100 PID 4980 wrote to memory of 2948 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 100 PID 4980 wrote to memory of 2948 4980 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 100 PID 3748 wrote to memory of 4608 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 104 PID 3748 wrote to memory of 4608 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 104 PID 3748 wrote to memory of 4608 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 104 PID 4608 wrote to memory of 3460 4608 cmd.exe 106 PID 4608 wrote to memory of 3460 4608 cmd.exe 106 PID 4608 wrote to memory of 3460 4608 cmd.exe 106 PID 3748 wrote to memory of 2740 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 107 PID 3748 wrote to memory of 2740 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 107 PID 3748 wrote to memory of 2740 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 107 PID 3748 wrote to memory of 3608 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 109 PID 3748 wrote to memory of 3608 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 109 PID 3748 wrote to memory of 3608 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 109 PID 3748 wrote to memory of 2076 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 110 PID 3748 wrote to memory of 2076 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 110 PID 3748 wrote to memory of 2076 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 110 PID 3748 wrote to memory of 3588 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 113 PID 3748 wrote to memory of 3588 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 113 PID 3748 wrote to memory of 3588 3748 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 113 PID 3460 wrote to memory of 1516 3460 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 115 PID 3460 wrote to memory of 1516 3460 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 115 PID 3460 wrote to memory of 1516 3460 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 115 PID 3460 wrote to memory of 4496 3460 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 116 PID 3460 wrote to memory of 4496 3460 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 116 PID 3460 wrote to memory of 4496 3460 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 116 PID 3460 wrote to memory of 2932 3460 c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe 117 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe"C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\GKEIUMMc\AyoMIMQs.exe"C:\Users\Admin\GKEIUMMc\AyoMIMQs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4912
-
-
C:\ProgramData\AawUgwUc\jOkAcoQs.exe"C:\ProgramData\AawUgwUc\jOkAcoQs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"2⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd983⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"4⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd985⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"6⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd987⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"8⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd989⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"10⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9811⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"12⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9813⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"14⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9815⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"16⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9817⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"18⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9819⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"20⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9821⤵
- Suspicious behavior: EnumeratesProcesses
PID:692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"22⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9823⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"24⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9825⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"26⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9827⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"28⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9829⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"30⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9831⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"32⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9833⤵PID:2824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"34⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9835⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"36⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9837⤵PID:4192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"38⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9839⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"40⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9841⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"42⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9843⤵PID:3244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"44⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9845⤵PID:2312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"46⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9847⤵PID:3216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"48⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9849⤵PID:2748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"50⤵PID:260
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9851⤵PID:1844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"52⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9853⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"54⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9855⤵PID:3796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"56⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9857⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"58⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9859⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"60⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9861⤵PID:740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"62⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9863⤵PID:2132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"64⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9865⤵PID:1912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"66⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9867⤵PID:3616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"68⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9869⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"70⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9871⤵PID:1408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"72⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9873⤵PID:2036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"74⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9875⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"76⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9877⤵PID:3760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"78⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9879⤵PID:3552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"80⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9881⤵PID:4624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"82⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9883⤵PID:216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"84⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9885⤵PID:2312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"86⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9887⤵PID:656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"88⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9889⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"90⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9891⤵PID:2316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"92⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9893⤵PID:1732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"94⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9895⤵PID:2496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"96⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9897⤵PID:3888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"98⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd9899⤵PID:2200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"100⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98101⤵PID:2680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"102⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98103⤵PID:1500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"104⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98105⤵PID:748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"106⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98107⤵PID:4328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"108⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98109⤵PID:4552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"110⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98111⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"112⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98113⤵PID:1080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"114⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98115⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"116⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98117⤵PID:2132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"118⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98119⤵PID:1272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"120⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98.exeC:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98121⤵PID:4396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c810cf6e387cc3f66fd0c1b67264b729b1f3995ac3654364af652d084398fd98"122⤵PID:3100
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-