Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe
Resource
win10v2004-20220901-en
General
-
Target
f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe
-
Size
499KB
-
MD5
92e36d600ecae197c77bbf2f9f8bdd90
-
SHA1
9e3827bc8921af6f2c49883931b415fd546570c1
-
SHA256
f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30
-
SHA512
db228795357abf3f636b82133f6ce7e4a9c07808f3389a5de0b6c2f4d405a534db3a835324fbcdfd11cb53930038ab0a1bd0db203fbffc43ef799b5b909e8e10
-
SSDEEP
12288:QHeVNdfPk+wJbfaY/KdMr2cJNmMRkaYu6SMCMIKKugvkqY:QHednk+whn/iMfJ/kaySMCMIKQ8L
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\vaQkcAkw\\cysksIsY.exe," f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\vaQkcAkw\\cysksIsY.exe," f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 1048 dGcIEQkw.exe 4324 cysksIsY.exe 4136 cocEwcYE.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation dGcIEQkw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cysksIsY.exe = "C:\\ProgramData\\vaQkcAkw\\cysksIsY.exe" f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dGcIEQkw.exe = "C:\\Users\\Admin\\pQckYIIA\\dGcIEQkw.exe" dGcIEQkw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cysksIsY.exe = "C:\\ProgramData\\vaQkcAkw\\cysksIsY.exe" cysksIsY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cysksIsY.exe = "C:\\ProgramData\\vaQkcAkw\\cysksIsY.exe" cocEwcYE.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dGcIEQkw.exe = "C:\\Users\\Admin\\pQckYIIA\\dGcIEQkw.exe" f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\pQckYIIA cocEwcYE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\pQckYIIA\dGcIEQkw cocEwcYE.exe File created C:\Windows\SysWOW64\shell32.dll.exe dGcIEQkw.exe File opened for modification C:\Windows\SysWOW64\sheBackupRead.pptx dGcIEQkw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2552 reg.exe 5072 reg.exe 3896 reg.exe 5104 reg.exe 4776 reg.exe 3656 reg.exe 4592 reg.exe 1940 reg.exe 3080 reg.exe 5064 reg.exe 4000 reg.exe 3356 reg.exe 4420 reg.exe 1976 reg.exe 4264 reg.exe 2700 reg.exe 3008 reg.exe 3584 reg.exe 204 reg.exe 2776 reg.exe 3484 reg.exe 364 reg.exe 476 reg.exe 4792 reg.exe 2704 reg.exe 2024 reg.exe 1372 reg.exe 2744 reg.exe 624 reg.exe 4724 reg.exe 4576 reg.exe 1040 reg.exe 2656 reg.exe 4220 reg.exe 3872 reg.exe 3912 reg.exe 2284 reg.exe 1184 reg.exe 1604 reg.exe 2412 reg.exe 1264 reg.exe 4788 reg.exe 1884 reg.exe 3644 reg.exe 3988 reg.exe 3208 reg.exe 1308 reg.exe 1968 reg.exe 4560 reg.exe 4648 reg.exe 1428 reg.exe 3396 reg.exe 2280 reg.exe 228 reg.exe 1968 reg.exe 4504 reg.exe 2396 reg.exe 4272 reg.exe 1200 reg.exe 1036 reg.exe 2836 reg.exe 4496 reg.exe 544 reg.exe 4244 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 404 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 404 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 404 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 404 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2808 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2808 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2808 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2808 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2972 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2972 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2972 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2972 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3172 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3172 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3172 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3172 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3116 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3116 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3116 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3116 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3444 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3444 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3444 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3444 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 4448 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 4448 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 4448 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 4448 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 1832 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 1832 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 1832 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 1832 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3628 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3628 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3628 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3628 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2232 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2232 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2232 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 2232 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 4456 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 4456 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 4456 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 4456 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 364 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 364 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 364 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 364 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1048 dGcIEQkw.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe 1048 dGcIEQkw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4896 wrote to memory of 1048 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 84 PID 4896 wrote to memory of 1048 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 84 PID 4896 wrote to memory of 1048 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 84 PID 4896 wrote to memory of 4324 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 85 PID 4896 wrote to memory of 4324 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 85 PID 4896 wrote to memory of 4324 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 85 PID 4896 wrote to memory of 1080 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 87 PID 4896 wrote to memory of 1080 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 87 PID 4896 wrote to memory of 1080 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 87 PID 4896 wrote to memory of 2780 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 89 PID 4896 wrote to memory of 2780 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 89 PID 4896 wrote to memory of 2780 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 89 PID 4896 wrote to memory of 3628 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 91 PID 4896 wrote to memory of 3628 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 91 PID 4896 wrote to memory of 3628 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 91 PID 4896 wrote to memory of 3624 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 94 PID 4896 wrote to memory of 3624 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 94 PID 4896 wrote to memory of 3624 4896 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 94 PID 1080 wrote to memory of 2612 1080 cmd.exe 93 PID 1080 wrote to memory of 2612 1080 cmd.exe 93 PID 1080 wrote to memory of 2612 1080 cmd.exe 93 PID 2612 wrote to memory of 4648 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 96 PID 2612 wrote to memory of 4648 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 96 PID 2612 wrote to memory of 4648 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 96 PID 2612 wrote to memory of 4420 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 98 PID 2612 wrote to memory of 4420 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 98 PID 2612 wrote to memory of 4420 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 98 PID 4648 wrote to memory of 3608 4648 cmd.exe 99 PID 4648 wrote to memory of 3608 4648 cmd.exe 99 PID 4648 wrote to memory of 3608 4648 cmd.exe 99 PID 2612 wrote to memory of 2140 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 101 PID 2612 wrote to memory of 2140 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 101 PID 2612 wrote to memory of 2140 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 101 PID 2612 wrote to memory of 2200 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 103 PID 2612 wrote to memory of 2200 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 103 PID 2612 wrote to memory of 2200 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 103 PID 2612 wrote to memory of 2496 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 104 PID 2612 wrote to memory of 2496 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 104 PID 2612 wrote to memory of 2496 2612 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 104 PID 3608 wrote to memory of 4280 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 107 PID 3608 wrote to memory of 4280 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 107 PID 3608 wrote to memory of 4280 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 107 PID 3608 wrote to memory of 3436 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 109 PID 3608 wrote to memory of 3436 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 109 PID 3608 wrote to memory of 3436 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 109 PID 3608 wrote to memory of 5052 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 110 PID 3608 wrote to memory of 5052 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 110 PID 3608 wrote to memory of 5052 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 110 PID 3608 wrote to memory of 3584 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 111 PID 3608 wrote to memory of 3584 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 111 PID 3608 wrote to memory of 3584 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 111 PID 3608 wrote to memory of 4908 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 114 PID 3608 wrote to memory of 4908 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 114 PID 3608 wrote to memory of 4908 3608 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 114 PID 4280 wrote to memory of 404 4280 cmd.exe 117 PID 4280 wrote to memory of 404 4280 cmd.exe 117 PID 4280 wrote to memory of 404 4280 cmd.exe 117 PID 4908 wrote to memory of 2232 4908 cmd.exe 118 PID 4908 wrote to memory of 2232 4908 cmd.exe 118 PID 4908 wrote to memory of 2232 4908 cmd.exe 118 PID 2496 wrote to memory of 3444 2496 cmd.exe 119 PID 2496 wrote to memory of 3444 2496 cmd.exe 119 PID 2496 wrote to memory of 3444 2496 cmd.exe 119 PID 404 wrote to memory of 2552 404 f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe"C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\pQckYIIA\dGcIEQkw.exe"C:\Users\Admin\pQckYIIA\dGcIEQkw.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1048
-
-
C:\ProgramData\vaQkcAkw\cysksIsY.exe"C:\ProgramData\vaQkcAkw\cysksIsY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"2⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc303⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"4⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc305⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"6⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc307⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"8⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc309⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"10⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3011⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"12⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3013⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"14⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3015⤵
- Suspicious behavior: EnumeratesProcesses
PID:3116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"16⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3017⤵
- Suspicious behavior: EnumeratesProcesses
PID:3444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"18⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3019⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"20⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3021⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"22⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3023⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"24⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3025⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"26⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3027⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"28⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3029⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"30⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3031⤵
- Suspicious behavior: EnumeratesProcesses
PID:364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"32⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3033⤵PID:4524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"34⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3035⤵PID:2340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"36⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3037⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"38⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3039⤵PID:2728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"40⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3041⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"42⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3043⤵PID:3768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"44⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3045⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"46⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3047⤵PID:624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"48⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3049⤵PID:476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"50⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3051⤵PID:4580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"52⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3053⤵PID:1228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"54⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3055⤵PID:2240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"56⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3057⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"58⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3059⤵PID:3464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"60⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3061⤵PID:4580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"62⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3063⤵PID:4712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"64⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3065⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"66⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3067⤵PID:4604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"68⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3069⤵PID:868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"70⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3071⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"72⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3073⤵PID:4436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"74⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3075⤵PID:4280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"76⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3077⤵PID:2424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"78⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3079⤵PID:1484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"80⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3081⤵PID:2332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"82⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3083⤵PID:4760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"84⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3085⤵PID:4784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"86⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3087⤵PID:3736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"88⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3089⤵PID:476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"90⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3091⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"92⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3093⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"94⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3095⤵PID:3848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"96⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3097⤵PID:1040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"98⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc3099⤵PID:3812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"100⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30101⤵PID:4276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"102⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30103⤵PID:2360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"104⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30105⤵PID:3384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"106⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30107⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"108⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30109⤵PID:4568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"110⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30111⤵PID:3452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"112⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30113⤵PID:3804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"114⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30115⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"116⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30117⤵PID:4240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"118⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30119⤵PID:2512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"120⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30.exeC:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30121⤵PID:3600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f19775c320e51fe1f9d4bfbee4c1ae2bd949c65ddf7588f406cefe9ad3dbfc30"122⤵PID:1992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-