Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 19:36
Static task
static1
Behavioral task
behavioral1
Sample
6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe
Resource
win10v2004-20220812-en
General
-
Target
6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe
-
Size
490KB
-
MD5
0cf395b795619dab1b77b296fe64fec0
-
SHA1
831649d5f97ded915427802c78e9b2f5492e4edd
-
SHA256
6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374
-
SHA512
445d6b8741064a7eaef8c7d4298969bb33c73441aa25a2cf712b35060315c7b777b9e7c100231ed9a412db50cba0e37408ea66ce6d255520074783941e8190f0
-
SSDEEP
12288:DtIdrPvjsH0lkpAHRlGwTyAJhHNLtU/vHc:OdzvjpTxAwTyAJBNLav8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\TicgIUss\\WaAgIMUM.exe," 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\TicgIUss\\WaAgIMUM.exe," 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 720 NCkIMUsY.exe 2220 WaAgIMUM.exe 1032 RmksIkkw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation NCkIMUsY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NCkIMUsY.exe = "C:\\Users\\Admin\\gkIAwYYw\\NCkIMUsY.exe" 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WaAgIMUM.exe = "C:\\ProgramData\\TicgIUss\\WaAgIMUM.exe" 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NCkIMUsY.exe = "C:\\Users\\Admin\\gkIAwYYw\\NCkIMUsY.exe" NCkIMUsY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WaAgIMUM.exe = "C:\\ProgramData\\TicgIUss\\WaAgIMUM.exe" WaAgIMUM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WaAgIMUM.exe = "C:\\ProgramData\\TicgIUss\\WaAgIMUM.exe" RmksIkkw.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sheResetResolve.exe NCkIMUsY.exe File opened for modification C:\Windows\SysWOW64\sheUndoSplit.jpg NCkIMUsY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\gkIAwYYw RmksIkkw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\gkIAwYYw\NCkIMUsY RmksIkkw.exe File created C:\Windows\SysWOW64\shell32.dll.exe NCkIMUsY.exe File opened for modification C:\Windows\SysWOW64\shePublishMount.docx NCkIMUsY.exe File opened for modification C:\Windows\SysWOW64\sheRegisterSwitch.gif NCkIMUsY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 396 reg.exe 3272 reg.exe 672 reg.exe 4572 reg.exe 1440 reg.exe 4924 reg.exe 4164 reg.exe 1016 reg.exe 3492 reg.exe 1016 reg.exe 1532 reg.exe 1144 reg.exe 4668 reg.exe 1328 reg.exe 3496 reg.exe 4496 reg.exe 4552 reg.exe 3756 reg.exe 1988 reg.exe 4916 reg.exe 3028 reg.exe 4036 reg.exe 4260 reg.exe 2060 reg.exe 2920 reg.exe 3596 reg.exe 1632 reg.exe 3860 reg.exe 3484 reg.exe 4984 reg.exe 3060 reg.exe 740 reg.exe 3424 reg.exe 1600 reg.exe 2344 reg.exe 1884 reg.exe 4300 reg.exe 4752 reg.exe 1668 reg.exe 1792 reg.exe 4760 reg.exe 1660 reg.exe 4572 reg.exe 1012 reg.exe 5044 reg.exe 3096 reg.exe 4036 reg.exe 2680 reg.exe 4428 reg.exe 2676 reg.exe 3260 reg.exe 3428 reg.exe 3460 reg.exe 1508 reg.exe 1556 reg.exe 4004 reg.exe 4956 reg.exe 1052 reg.exe 2068 reg.exe 4180 reg.exe 4372 reg.exe 1220 reg.exe 4860 reg.exe 4972 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3980 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3980 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3980 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3980 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 2460 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 2460 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 2460 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 2460 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3928 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3928 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3928 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3928 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4764 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4764 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4764 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4764 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4284 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4284 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4284 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4284 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 1788 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 1788 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 1788 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 1788 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3280 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3280 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3280 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3280 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4264 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4264 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4264 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4264 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3464 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3464 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3464 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 3464 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 2580 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 2580 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 2580 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 2580 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4512 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4512 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4512 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 4512 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 1996 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 1996 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 1996 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 1996 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 1792 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 1792 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 1792 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 1792 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 720 NCkIMUsY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe 720 NCkIMUsY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 968 wrote to memory of 720 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 82 PID 968 wrote to memory of 720 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 82 PID 968 wrote to memory of 720 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 82 PID 968 wrote to memory of 2220 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 83 PID 968 wrote to memory of 2220 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 83 PID 968 wrote to memory of 2220 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 83 PID 968 wrote to memory of 620 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 85 PID 968 wrote to memory of 620 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 85 PID 968 wrote to memory of 620 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 85 PID 620 wrote to memory of 616 620 cmd.exe 87 PID 620 wrote to memory of 616 620 cmd.exe 87 PID 620 wrote to memory of 616 620 cmd.exe 87 PID 968 wrote to memory of 4792 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 88 PID 968 wrote to memory of 4792 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 88 PID 968 wrote to memory of 4792 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 88 PID 968 wrote to memory of 4736 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 89 PID 968 wrote to memory of 4736 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 89 PID 968 wrote to memory of 4736 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 89 PID 968 wrote to memory of 4704 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 90 PID 968 wrote to memory of 4704 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 90 PID 968 wrote to memory of 4704 968 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 90 PID 616 wrote to memory of 1280 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 94 PID 616 wrote to memory of 1280 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 94 PID 616 wrote to memory of 1280 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 94 PID 1280 wrote to memory of 2316 1280 cmd.exe 96 PID 1280 wrote to memory of 2316 1280 cmd.exe 96 PID 1280 wrote to memory of 2316 1280 cmd.exe 96 PID 616 wrote to memory of 3096 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 97 PID 616 wrote to memory of 3096 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 97 PID 616 wrote to memory of 3096 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 97 PID 616 wrote to memory of 1124 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 98 PID 616 wrote to memory of 1124 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 98 PID 616 wrote to memory of 1124 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 98 PID 616 wrote to memory of 3424 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 99 PID 616 wrote to memory of 3424 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 99 PID 616 wrote to memory of 3424 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 99 PID 616 wrote to memory of 4412 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 103 PID 616 wrote to memory of 4412 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 103 PID 616 wrote to memory of 4412 616 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 103 PID 4412 wrote to memory of 4264 4412 cmd.exe 105 PID 4412 wrote to memory of 4264 4412 cmd.exe 105 PID 4412 wrote to memory of 4264 4412 cmd.exe 105 PID 2316 wrote to memory of 204 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 106 PID 2316 wrote to memory of 204 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 106 PID 2316 wrote to memory of 204 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 106 PID 204 wrote to memory of 3980 204 cmd.exe 108 PID 204 wrote to memory of 3980 204 cmd.exe 108 PID 204 wrote to memory of 3980 204 cmd.exe 108 PID 2316 wrote to memory of 1532 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 109 PID 2316 wrote to memory of 1532 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 109 PID 2316 wrote to memory of 1532 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 109 PID 2316 wrote to memory of 1332 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 110 PID 2316 wrote to memory of 1332 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 110 PID 2316 wrote to memory of 1332 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 110 PID 2316 wrote to memory of 1900 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 111 PID 2316 wrote to memory of 1900 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 111 PID 2316 wrote to memory of 1900 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 111 PID 2316 wrote to memory of 4460 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 113 PID 2316 wrote to memory of 4460 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 113 PID 2316 wrote to memory of 4460 2316 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 113 PID 4460 wrote to memory of 3060 4460 cmd.exe 117 PID 4460 wrote to memory of 3060 4460 cmd.exe 117 PID 4460 wrote to memory of 3060 4460 cmd.exe 117 PID 3980 wrote to memory of 1444 3980 6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe"C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\gkIAwYYw\NCkIMUsY.exe"C:\Users\Admin\gkIAwYYw\NCkIMUsY.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:720
-
-
C:\ProgramData\TicgIUss\WaAgIMUM.exe"C:\ProgramData\TicgIUss\WaAgIMUM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"2⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f2043743⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"4⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f2043745⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"6⤵
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f2043747⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"8⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f2043749⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"10⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437411⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"12⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437413⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"14⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437415⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"16⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437417⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"18⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437419⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"20⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437421⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"22⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437423⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"24⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437425⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"26⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437427⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"28⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437429⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"30⤵PID:504
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437431⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"32⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437433⤵PID:3940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"34⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437435⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"36⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437437⤵PID:1396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"38⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437439⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"40⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437441⤵PID:1516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"42⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437443⤵PID:4604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"44⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437445⤵PID:1132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"46⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437447⤵PID:2736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"48⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437449⤵PID:1672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"50⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437451⤵PID:3508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"52⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437453⤵PID:4532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"54⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437455⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"56⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437457⤵PID:1900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"58⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437459⤵PID:1492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"60⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437461⤵PID:4128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"62⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437463⤵PID:4304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"64⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437465⤵PID:740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"66⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437467⤵PID:1560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"68⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437469⤵PID:3732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"70⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437471⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"72⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437473⤵PID:3412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"74⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437475⤵PID:416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"76⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437477⤵PID:4792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"78⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437479⤵PID:2016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"80⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437481⤵PID:3900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"82⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437483⤵PID:3768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"84⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437485⤵PID:4328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"86⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437487⤵PID:4504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"88⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437489⤵PID:1220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"90⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437491⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"92⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437493⤵PID:712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"94⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437495⤵PID:4344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"96⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437497⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"98⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f20437499⤵PID:1400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"100⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374101⤵PID:520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"102⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374103⤵PID:1116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"104⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374105⤵PID:504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"106⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374107⤵PID:836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"108⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374109⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"110⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374111⤵PID:3032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"112⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374113⤵PID:1884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"114⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374115⤵PID:3592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"116⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374117⤵PID:4804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"118⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374119⤵PID:4728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"120⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374.exeC:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374121⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6a7553b29b06d7e610ed82b50ba9357004d15af87957e4fa44c1b1fa1f204374"122⤵PID:4132
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-