Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe
Resource
win10v2004-20220901-en
General
-
Target
c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe
-
Size
494KB
-
MD5
83f046f6f230a07eab101ed3331344f0
-
SHA1
96b3f91c5078aa888e5891b7ec6535f0f3549d9c
-
SHA256
c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598
-
SHA512
fe0bf74b3d024bdd4223e16579923d9ae3b677fa11f5e625147cda79ea08376b040387a25b1317e205ceed4d537659de3b88ec68a9ff2a31a169aa0c8974062b
-
SSDEEP
12288:gKd82tx6ZWoLX6sg8v4h3HMVt30pgz70B+YqykNuc:jhsxLXRY3sV67Fkl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\iIoQcAsM\\sCQsQssk.exe," c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\iIoQcAsM\\sCQsQssk.exe," c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2440 nIQUkoQY.exe 2396 sCQsQssk.exe 2116 xEwoIQwk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation nIQUkoQY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nIQUkoQY.exe = "C:\\Users\\Admin\\pKcAAwko\\nIQUkoQY.exe" nIQUkoQY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sCQsQssk.exe = "C:\\ProgramData\\iIoQcAsM\\sCQsQssk.exe" sCQsQssk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sCQsQssk.exe = "C:\\ProgramData\\iIoQcAsM\\sCQsQssk.exe" xEwoIQwk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nIQUkoQY.exe = "C:\\Users\\Admin\\pKcAAwko\\nIQUkoQY.exe" c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sCQsQssk.exe = "C:\\ProgramData\\iIoQcAsM\\sCQsQssk.exe" c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\pKcAAwko xEwoIQwk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\pKcAAwko\nIQUkoQY xEwoIQwk.exe File created C:\Windows\SysWOW64\shell32.dll.exe nIQUkoQY.exe File opened for modification C:\Windows\SysWOW64\sheSearchUninstall.zip nIQUkoQY.exe File opened for modification C:\Windows\SysWOW64\sheWriteRename.rar nIQUkoQY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2232 reg.exe 3132 reg.exe 3912 reg.exe 2760 reg.exe 1668 reg.exe 4320 reg.exe 4680 reg.exe 2152 reg.exe 3096 reg.exe 3132 reg.exe 396 reg.exe 4384 reg.exe 1976 reg.exe 1976 reg.exe 1416 reg.exe 2080 reg.exe 3732 reg.exe 900 reg.exe 3748 Process not Found 1172 reg.exe 3104 reg.exe 3668 reg.exe 1920 reg.exe 4368 reg.exe 3456 reg.exe 3504 reg.exe 3096 reg.exe 1176 reg.exe 2548 reg.exe 1368 reg.exe 1480 reg.exe 2204 Process not Found 4644 reg.exe 4464 reg.exe 4792 reg.exe 4700 reg.exe 4800 reg.exe 4404 reg.exe 3084 reg.exe 4340 reg.exe 740 Process not Found 4416 Process not Found 4936 reg.exe 1096 reg.exe 2160 reg.exe 1584 reg.exe 1368 reg.exe 1980 reg.exe 3060 reg.exe 4936 reg.exe 5008 reg.exe 440 reg.exe 4712 reg.exe 3880 reg.exe 3236 reg.exe 4800 reg.exe 5020 reg.exe 4976 Process not Found 1708 reg.exe 4456 reg.exe 732 reg.exe 2068 reg.exe 1856 Process not Found 1752 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4092 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4092 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4092 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4092 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 920 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 920 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 920 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 920 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 3900 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 3900 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 3900 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 3900 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 1856 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 1856 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 1856 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 1856 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 1708 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 1708 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 1708 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 1708 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 3896 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 3896 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 3896 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 3896 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 1836 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 1836 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 1836 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 1836 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2232 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2232 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2232 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2232 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4576 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4576 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4576 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 4576 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2100 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2100 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2100 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2100 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2288 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2288 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2288 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2288 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2036 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2036 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2036 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2036 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2520 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2520 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2520 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 2520 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2440 nIQUkoQY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe 2440 nIQUkoQY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4796 wrote to memory of 2440 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 82 PID 4796 wrote to memory of 2440 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 82 PID 4796 wrote to memory of 2440 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 82 PID 4796 wrote to memory of 2396 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 83 PID 4796 wrote to memory of 2396 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 83 PID 4796 wrote to memory of 2396 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 83 PID 4796 wrote to memory of 1904 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 85 PID 4796 wrote to memory of 1904 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 85 PID 4796 wrote to memory of 1904 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 85 PID 4796 wrote to memory of 4712 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 87 PID 4796 wrote to memory of 4712 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 87 PID 4796 wrote to memory of 4712 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 87 PID 4796 wrote to memory of 1356 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 88 PID 4796 wrote to memory of 1356 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 88 PID 4796 wrote to memory of 1356 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 88 PID 1904 wrote to memory of 368 1904 cmd.exe 89 PID 1904 wrote to memory of 368 1904 cmd.exe 89 PID 1904 wrote to memory of 368 1904 cmd.exe 89 PID 4796 wrote to memory of 5068 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 90 PID 4796 wrote to memory of 5068 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 90 PID 4796 wrote to memory of 5068 4796 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 90 PID 368 wrote to memory of 3732 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 94 PID 368 wrote to memory of 3732 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 94 PID 368 wrote to memory of 3732 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 94 PID 3732 wrote to memory of 4644 3732 cmd.exe 96 PID 3732 wrote to memory of 4644 3732 cmd.exe 96 PID 3732 wrote to memory of 4644 3732 cmd.exe 96 PID 368 wrote to memory of 1172 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 97 PID 368 wrote to memory of 1172 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 97 PID 368 wrote to memory of 1172 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 97 PID 368 wrote to memory of 1272 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 98 PID 368 wrote to memory of 1272 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 98 PID 368 wrote to memory of 1272 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 98 PID 368 wrote to memory of 2616 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 99 PID 368 wrote to memory of 2616 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 99 PID 368 wrote to memory of 2616 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 99 PID 368 wrote to memory of 5056 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 102 PID 368 wrote to memory of 5056 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 102 PID 368 wrote to memory of 5056 368 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 102 PID 4644 wrote to memory of 2448 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 106 PID 4644 wrote to memory of 2448 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 106 PID 4644 wrote to memory of 2448 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 106 PID 4644 wrote to memory of 3504 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 107 PID 4644 wrote to memory of 3504 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 107 PID 4644 wrote to memory of 3504 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 107 PID 2448 wrote to memory of 4092 2448 cmd.exe 108 PID 2448 wrote to memory of 4092 2448 cmd.exe 108 PID 2448 wrote to memory of 4092 2448 cmd.exe 108 PID 4644 wrote to memory of 4108 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 109 PID 4644 wrote to memory of 4108 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 109 PID 4644 wrote to memory of 4108 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 109 PID 4644 wrote to memory of 4260 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 110 PID 4644 wrote to memory of 4260 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 110 PID 4644 wrote to memory of 4260 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 110 PID 4644 wrote to memory of 3464 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 113 PID 4644 wrote to memory of 3464 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 113 PID 4644 wrote to memory of 3464 4644 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 113 PID 4092 wrote to memory of 3336 4092 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 116 PID 4092 wrote to memory of 3336 4092 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 116 PID 4092 wrote to memory of 3336 4092 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 116 PID 3336 wrote to memory of 920 3336 cmd.exe 118 PID 3336 wrote to memory of 920 3336 cmd.exe 118 PID 3336 wrote to memory of 920 3336 cmd.exe 118 PID 4092 wrote to memory of 4476 4092 c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe"C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\pKcAAwko\nIQUkoQY.exe"C:\Users\Admin\pKcAAwko\nIQUkoQY.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2440
-
-
C:\ProgramData\iIoQcAsM\sCQsQssk.exe"C:\ProgramData\iIoQcAsM\sCQsQssk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"2⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac5983⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"4⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac5985⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"6⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac5987⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"8⤵
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac5989⤵
- Suspicious behavior: EnumeratesProcesses
PID:920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"10⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59811⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"12⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59813⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"14⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59815⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"16⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59817⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"18⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59819⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"20⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59821⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"22⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59823⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"24⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59825⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"26⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59827⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"28⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59829⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"30⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59831⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"32⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59833⤵PID:2100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"34⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59835⤵PID:676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"36⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59837⤵PID:2876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"38⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59839⤵PID:4300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"40⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59841⤵PID:1368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"42⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59843⤵PID:3980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"44⤵PID:540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59845⤵PID:1944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"46⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59847⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"48⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59849⤵PID:2296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"50⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59851⤵PID:856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"52⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59853⤵PID:3116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"54⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59855⤵PID:4712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"56⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59857⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"58⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59859⤵PID:3924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"60⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59861⤵PID:3008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"62⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59863⤵PID:2920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"64⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59865⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"66⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59867⤵PID:1080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"68⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59869⤵PID:2756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"70⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59871⤵PID:3912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"72⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59873⤵PID:4024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"74⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59875⤵PID:5100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"76⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59877⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"78⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59879⤵PID:4300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"80⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59881⤵PID:2604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"82⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59883⤵PID:3100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"84⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59885⤵PID:3900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"86⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59887⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"88⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59889⤵PID:1944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"90⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59891⤵PID:3492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"92⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59893⤵PID:2444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"94⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59895⤵PID:4144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"96⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59897⤵PID:732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"98⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac59899⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"100⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598101⤵PID:3404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"102⤵PID:360
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598103⤵PID:3788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"104⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598105⤵PID:856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"106⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598107⤵PID:2232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"108⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598109⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"110⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598111⤵PID:1536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"112⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598113⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"114⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598115⤵PID:1776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"116⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598117⤵PID:920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"118⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598119⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"120⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598.exeC:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598121⤵PID:2036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c7a114e54e2ce52679d4939e9157cded41182dbe9f4972202e4aee52704ac598"122⤵PID:2308
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-