Analysis
-
max time kernel
71s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 01:56
Behavioral task
behavioral1
Sample
c6777681840142e5a9b1533a6c5be030_NEIKI.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c6777681840142e5a9b1533a6c5be030_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
c6777681840142e5a9b1533a6c5be030_NEIKI.exe
-
Size
3.0MB
-
MD5
c6777681840142e5a9b1533a6c5be030
-
SHA1
bc9c02110042752b862a7705fdf7daf2c4e11243
-
SHA256
ebf44ea6a7f94cab9a8b895e837d172fd75158a95d342daa9141c17aa195b87f
-
SHA512
87d366fe4ee532a6f31927e3f35ffd0bfcfa302c141f45e34bc02c1a78c68058caac5e3d9501ef860fbe6db4c9d2959c2f0f4dca3b72bfd0943feefa00a63a48
-
SSDEEP
98304:N0GnJMOWPClFdx6e0EALKWVTffZiPAcRq6jHjc40H:NFWPClFkH
Malware Config
Signatures
-
XMRig Miner payload 64 IoCs
resource yara_rule behavioral2/memory/2252-0-0x00007FF72DCF0000-0x00007FF72E0E5000-memory.dmp xmrig behavioral2/files/0x000700000002328e-5.dat xmrig behavioral2/files/0x00090000000233f3-9.dat xmrig behavioral2/files/0x00080000000233f9-10.dat xmrig behavioral2/files/0x00070000000233fb-26.dat xmrig behavioral2/files/0x00070000000233fc-33.dat xmrig behavioral2/files/0x00070000000233fe-43.dat xmrig behavioral2/files/0x00070000000233ff-48.dat xmrig behavioral2/files/0x0007000000023404-73.dat xmrig behavioral2/files/0x0007000000023406-81.dat xmrig behavioral2/files/0x0007000000023408-93.dat xmrig behavioral2/files/0x000700000002340d-116.dat xmrig behavioral2/memory/1996-799-0x00007FF667F80000-0x00007FF668375000-memory.dmp xmrig behavioral2/files/0x0007000000023417-164.dat xmrig behavioral2/files/0x0007000000023416-160.dat xmrig behavioral2/files/0x0007000000023415-159.dat xmrig behavioral2/files/0x0007000000023414-153.dat xmrig behavioral2/files/0x0007000000023413-148.dat xmrig behavioral2/files/0x0007000000023412-143.dat xmrig behavioral2/files/0x0007000000023411-138.dat xmrig behavioral2/files/0x0007000000023410-133.dat xmrig behavioral2/files/0x000700000002340f-128.dat xmrig behavioral2/files/0x000700000002340e-123.dat xmrig behavioral2/files/0x000700000002340c-113.dat xmrig behavioral2/files/0x000700000002340b-108.dat xmrig behavioral2/files/0x000700000002340a-103.dat xmrig behavioral2/files/0x0007000000023409-98.dat xmrig behavioral2/files/0x0007000000023407-88.dat xmrig behavioral2/files/0x0007000000023405-78.dat xmrig behavioral2/memory/4660-801-0x00007FF7081E0000-0x00007FF7085D5000-memory.dmp xmrig behavioral2/files/0x0007000000023403-68.dat xmrig behavioral2/memory/5080-802-0x00007FF7BA5E0000-0x00007FF7BA9D5000-memory.dmp xmrig behavioral2/files/0x0007000000023402-63.dat xmrig behavioral2/files/0x0007000000023401-58.dat xmrig behavioral2/files/0x0007000000023400-53.dat xmrig behavioral2/files/0x00070000000233fd-38.dat xmrig behavioral2/memory/2384-24-0x00007FF735920000-0x00007FF735D15000-memory.dmp xmrig behavioral2/files/0x00070000000233fa-22.dat xmrig behavioral2/memory/1652-18-0x00007FF68CC00000-0x00007FF68CFF5000-memory.dmp xmrig behavioral2/memory/4340-806-0x00007FF710DE0000-0x00007FF7111D5000-memory.dmp xmrig behavioral2/memory/4368-811-0x00007FF67AC00000-0x00007FF67AFF5000-memory.dmp xmrig behavioral2/memory/3952-818-0x00007FF6503F0000-0x00007FF6507E5000-memory.dmp xmrig behavioral2/memory/4244-823-0x00007FF7AE890000-0x00007FF7AEC85000-memory.dmp xmrig behavioral2/memory/2120-835-0x00007FF7A9B10000-0x00007FF7A9F05000-memory.dmp xmrig behavioral2/memory/3340-839-0x00007FF67E040000-0x00007FF67E435000-memory.dmp xmrig behavioral2/memory/1600-842-0x00007FF7F34A0000-0x00007FF7F3895000-memory.dmp xmrig behavioral2/memory/3188-832-0x00007FF6438C0000-0x00007FF643CB5000-memory.dmp xmrig behavioral2/memory/3004-856-0x00007FF75FD40000-0x00007FF760135000-memory.dmp xmrig behavioral2/memory/4672-860-0x00007FF6AA320000-0x00007FF6AA715000-memory.dmp xmrig behavioral2/memory/5092-864-0x00007FF6279A0000-0x00007FF627D95000-memory.dmp xmrig behavioral2/memory/2516-863-0x00007FF6F2520000-0x00007FF6F2915000-memory.dmp xmrig behavioral2/memory/4648-865-0x00007FF777E70000-0x00007FF778265000-memory.dmp xmrig behavioral2/memory/4704-874-0x00007FF6267F0000-0x00007FF626BE5000-memory.dmp xmrig behavioral2/memory/4724-877-0x00007FF6800D0000-0x00007FF6804C5000-memory.dmp xmrig behavioral2/memory/5060-880-0x00007FF6E8260000-0x00007FF6E8655000-memory.dmp xmrig behavioral2/memory/2484-907-0x00007FF714B10000-0x00007FF714F05000-memory.dmp xmrig behavioral2/memory/3632-909-0x00007FF7AB250000-0x00007FF7AB645000-memory.dmp xmrig behavioral2/memory/4968-905-0x00007FF60E720000-0x00007FF60EB15000-memory.dmp xmrig behavioral2/memory/1652-1918-0x00007FF68CC00000-0x00007FF68CFF5000-memory.dmp xmrig behavioral2/memory/1996-1919-0x00007FF667F80000-0x00007FF668375000-memory.dmp xmrig behavioral2/memory/2384-1920-0x00007FF735920000-0x00007FF735D15000-memory.dmp xmrig behavioral2/memory/4660-1921-0x00007FF7081E0000-0x00007FF7085D5000-memory.dmp xmrig behavioral2/memory/3632-1922-0x00007FF7AB250000-0x00007FF7AB645000-memory.dmp xmrig behavioral2/memory/4368-1925-0x00007FF67AC00000-0x00007FF67AFF5000-memory.dmp xmrig -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 64 IoCs
pid Process 1652 LRboMcN.exe 1996 WchiRXO.exe 2384 ZXnUXDw.exe 4660 euEBaxs.exe 3632 CvzkAJB.exe 5080 JSEdndg.exe 4340 rLpNdaO.exe 4368 cjSNIWw.exe 3952 wGTBIqE.exe 4244 niiLZsl.exe 3188 YPIwNuT.exe 2120 CpsoxbL.exe 3340 GPEhDYy.exe 1600 RCYENms.exe 3004 ygBclbU.exe 4672 iUZyDUe.exe 2516 RPKNPHY.exe 5092 GkaiXHx.exe 4648 OyvnEBQ.exe 4704 SHoCdhK.exe 4724 nkdemCn.exe 5060 nOXcPQy.exe 4968 PehKLOK.exe 2484 ePsAYbB.exe 1252 UkqAXrQ.exe 4788 WcdklGr.exe 1944 OqAgtVn.exe 4512 bbsSpXB.exe 4896 dbdGQzA.exe 548 kVJThVE.exe 2196 fbjRQke.exe 3928 AcTlGCa.exe 1332 lqgiCkX.exe 1352 dCGIghW.exe 1732 ihanwic.exe 4688 ONfXmCX.exe 5100 LzujTlU.exe 5012 sbdTWXb.exe 2444 DqREBTF.exe 4824 wUswiTw.exe 412 voMqzBo.exe 3724 bXiYDEK.exe 4128 FLWfggK.exe 4240 lYTwUdF.exe 2940 cyHdfzR.exe 1920 EVFUBRP.exe 3348 cFgdnsX.exe 3740 VnyyoRN.exe 4276 CtOVMhu.exe 212 JZTNZOQ.exe 3296 AHbcnTQ.exe 4328 VxgARUy.exe 4732 jcnPppw.exe 5000 dlVaako.exe 740 iBTzCzC.exe 2408 oFSgTKQ.exe 3372 QnWtzju.exe 1916 kCyyGkJ.exe 916 mgkcrcj.exe 2348 XwadKjZ.exe 804 uUJPgYf.exe 3000 ezPAMHc.exe 3652 XNOtOWZ.exe 640 fWEAHZo.exe -
resource yara_rule behavioral2/memory/2252-0-0x00007FF72DCF0000-0x00007FF72E0E5000-memory.dmp upx behavioral2/files/0x000700000002328e-5.dat upx behavioral2/files/0x00090000000233f3-9.dat upx behavioral2/files/0x00080000000233f9-10.dat upx behavioral2/files/0x00070000000233fb-26.dat upx behavioral2/files/0x00070000000233fc-33.dat upx behavioral2/files/0x00070000000233fe-43.dat upx behavioral2/files/0x00070000000233ff-48.dat upx behavioral2/files/0x0007000000023404-73.dat upx behavioral2/files/0x0007000000023406-81.dat upx behavioral2/files/0x0007000000023408-93.dat upx behavioral2/files/0x000700000002340d-116.dat upx behavioral2/memory/1996-799-0x00007FF667F80000-0x00007FF668375000-memory.dmp upx behavioral2/files/0x0007000000023417-164.dat upx behavioral2/files/0x0007000000023416-160.dat upx behavioral2/files/0x0007000000023415-159.dat upx behavioral2/files/0x0007000000023414-153.dat upx behavioral2/files/0x0007000000023413-148.dat upx behavioral2/files/0x0007000000023412-143.dat upx behavioral2/files/0x0007000000023411-138.dat upx behavioral2/files/0x0007000000023410-133.dat upx behavioral2/files/0x000700000002340f-128.dat upx behavioral2/files/0x000700000002340e-123.dat upx behavioral2/files/0x000700000002340c-113.dat upx behavioral2/files/0x000700000002340b-108.dat upx behavioral2/files/0x000700000002340a-103.dat upx behavioral2/files/0x0007000000023409-98.dat upx behavioral2/files/0x0007000000023407-88.dat upx behavioral2/files/0x0007000000023405-78.dat upx behavioral2/memory/4660-801-0x00007FF7081E0000-0x00007FF7085D5000-memory.dmp upx behavioral2/files/0x0007000000023403-68.dat upx behavioral2/memory/5080-802-0x00007FF7BA5E0000-0x00007FF7BA9D5000-memory.dmp upx behavioral2/files/0x0007000000023402-63.dat upx behavioral2/files/0x0007000000023401-58.dat upx behavioral2/files/0x0007000000023400-53.dat upx behavioral2/files/0x00070000000233fd-38.dat upx behavioral2/memory/2384-24-0x00007FF735920000-0x00007FF735D15000-memory.dmp upx behavioral2/files/0x00070000000233fa-22.dat upx behavioral2/memory/1652-18-0x00007FF68CC00000-0x00007FF68CFF5000-memory.dmp upx behavioral2/memory/4340-806-0x00007FF710DE0000-0x00007FF7111D5000-memory.dmp upx behavioral2/memory/4368-811-0x00007FF67AC00000-0x00007FF67AFF5000-memory.dmp upx behavioral2/memory/3952-818-0x00007FF6503F0000-0x00007FF6507E5000-memory.dmp upx behavioral2/memory/4244-823-0x00007FF7AE890000-0x00007FF7AEC85000-memory.dmp upx behavioral2/memory/2120-835-0x00007FF7A9B10000-0x00007FF7A9F05000-memory.dmp upx behavioral2/memory/3340-839-0x00007FF67E040000-0x00007FF67E435000-memory.dmp upx behavioral2/memory/1600-842-0x00007FF7F34A0000-0x00007FF7F3895000-memory.dmp upx behavioral2/memory/3188-832-0x00007FF6438C0000-0x00007FF643CB5000-memory.dmp upx behavioral2/memory/3004-856-0x00007FF75FD40000-0x00007FF760135000-memory.dmp upx behavioral2/memory/4672-860-0x00007FF6AA320000-0x00007FF6AA715000-memory.dmp upx behavioral2/memory/5092-864-0x00007FF6279A0000-0x00007FF627D95000-memory.dmp upx behavioral2/memory/2516-863-0x00007FF6F2520000-0x00007FF6F2915000-memory.dmp upx behavioral2/memory/4648-865-0x00007FF777E70000-0x00007FF778265000-memory.dmp upx behavioral2/memory/4704-874-0x00007FF6267F0000-0x00007FF626BE5000-memory.dmp upx behavioral2/memory/4724-877-0x00007FF6800D0000-0x00007FF6804C5000-memory.dmp upx behavioral2/memory/5060-880-0x00007FF6E8260000-0x00007FF6E8655000-memory.dmp upx behavioral2/memory/2484-907-0x00007FF714B10000-0x00007FF714F05000-memory.dmp upx behavioral2/memory/3632-909-0x00007FF7AB250000-0x00007FF7AB645000-memory.dmp upx behavioral2/memory/4968-905-0x00007FF60E720000-0x00007FF60EB15000-memory.dmp upx behavioral2/memory/1652-1918-0x00007FF68CC00000-0x00007FF68CFF5000-memory.dmp upx behavioral2/memory/1996-1919-0x00007FF667F80000-0x00007FF668375000-memory.dmp upx behavioral2/memory/2384-1920-0x00007FF735920000-0x00007FF735D15000-memory.dmp upx behavioral2/memory/4660-1921-0x00007FF7081E0000-0x00007FF7085D5000-memory.dmp upx behavioral2/memory/3632-1922-0x00007FF7AB250000-0x00007FF7AB645000-memory.dmp upx behavioral2/memory/4368-1925-0x00007FF67AC00000-0x00007FF67AFF5000-memory.dmp upx -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\System32\ayHrSVB.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\bqkLutU.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\jMhtpgd.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\hkCPCjT.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\YToGBxy.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\KDcpDvw.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\tmcNikC.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\BGibLHq.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\ONfXmCX.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\RRmNDYJ.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\BGzxujG.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\lkCxHfs.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\mqLPxPL.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\GOwPCei.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\FWItpWx.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\FkvWCnV.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\xzSxxRb.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\plgEywg.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\tgNfynz.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\XMbdzfA.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\xdTfAHo.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\yQLSRXt.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\jprokSp.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\xFWMwHe.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\lOtYjIm.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\fpztJbY.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\pmIYEXN.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\wrGTRhu.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\eplbOpg.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\FLwyqIY.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\UNlLrGY.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\mxXaDEK.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\xVYvXaZ.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\mScGvlk.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\pPmRmbE.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\WLRMXKd.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\ICCFxyx.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\dbdGQzA.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\FNOjVDt.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\sTggaSx.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\YlzBSVK.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\SLtqeuO.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\ZvvkKgO.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\cmfYXud.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\qlhJuGj.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\QwcaXjO.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\dpCrLui.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\GzkpNHO.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\fhhtqWk.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\PhSMRtM.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\oyvfwyX.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\DlBwqqO.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\nlRmvZK.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\jmLvegZ.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\ZFJPNzq.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\OOZWPkI.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\JXFyLmz.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\MOyYhTE.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\AJXmOzW.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\VhNsNid.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\lqgiCkX.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\JZTNZOQ.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\hDeqHRC.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe File created C:\Windows\System32\VHzLlJz.exe c6777681840142e5a9b1533a6c5be030_NEIKI.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4124900551-4068476067-3491212533-1000\{01277F0C-18AD-4F31-8DE1-4D4EF13CB3C7} explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4124900551-4068476067-3491212533-1000\{8585FA1D-69A6-467E-B242-A55EF3404E15} explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4124900551-4068476067-3491212533-1000\{FFF0B1E7-9D16-4670-93E8-A2CFC5081372} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2148 explorer.exe Token: SeCreatePagefilePrivilege 2148 explorer.exe Token: SeShutdownPrivilege 2148 explorer.exe Token: SeCreatePagefilePrivilege 2148 explorer.exe Token: SeShutdownPrivilege 2148 explorer.exe Token: SeCreatePagefilePrivilege 2148 explorer.exe Token: SeShutdownPrivilege 2148 explorer.exe Token: SeCreatePagefilePrivilege 2148 explorer.exe Token: SeShutdownPrivilege 2148 explorer.exe Token: SeCreatePagefilePrivilege 2148 explorer.exe Token: SeShutdownPrivilege 2148 explorer.exe Token: SeCreatePagefilePrivilege 2148 explorer.exe Token: SeShutdownPrivilege 2148 explorer.exe Token: SeCreatePagefilePrivilege 2148 explorer.exe Token: SeShutdownPrivilege 2148 explorer.exe Token: SeCreatePagefilePrivilege 2148 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 5428 explorer.exe Token: SeCreatePagefilePrivilege 5428 explorer.exe Token: SeShutdownPrivilege 7860 explorer.exe Token: SeCreatePagefilePrivilege 7860 explorer.exe Token: SeShutdownPrivilege 7860 explorer.exe Token: SeCreatePagefilePrivilege 7860 explorer.exe Token: SeShutdownPrivilege 7860 explorer.exe Token: SeCreatePagefilePrivilege 7860 explorer.exe Token: SeShutdownPrivilege 7860 explorer.exe Token: SeCreatePagefilePrivilege 7860 explorer.exe Token: SeShutdownPrivilege 7860 explorer.exe Token: SeCreatePagefilePrivilege 7860 explorer.exe Token: SeShutdownPrivilege 7860 explorer.exe Token: SeCreatePagefilePrivilege 7860 explorer.exe Token: SeShutdownPrivilege 7860 explorer.exe Token: SeCreatePagefilePrivilege 7860 explorer.exe Token: SeShutdownPrivilege 7860 explorer.exe Token: SeCreatePagefilePrivilege 7860 explorer.exe Token: SeShutdownPrivilege 7860 explorer.exe Token: SeCreatePagefilePrivilege 7860 explorer.exe Token: SeShutdownPrivilege 7860 explorer.exe Token: SeCreatePagefilePrivilege 7860 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 12700 sihost.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 2148 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 5428 explorer.exe 7860 explorer.exe 7860 explorer.exe 7860 explorer.exe 7860 explorer.exe 7860 explorer.exe 7860 explorer.exe 7860 explorer.exe 7860 explorer.exe 7860 explorer.exe 7860 explorer.exe 7860 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe 3432 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1276 StartMenuExperienceHost.exe 3704 StartMenuExperienceHost.exe 1600 StartMenuExperienceHost.exe 5728 SearchApp.exe 5624 StartMenuExperienceHost.exe 5960 SearchApp.exe 6220 StartMenuExperienceHost.exe 6432 SearchApp.exe 11068 StartMenuExperienceHost.exe 10284 SearchApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1652 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 83 PID 2252 wrote to memory of 1652 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 83 PID 2252 wrote to memory of 1996 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 84 PID 2252 wrote to memory of 1996 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 84 PID 2252 wrote to memory of 2384 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 85 PID 2252 wrote to memory of 2384 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 85 PID 2252 wrote to memory of 4660 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 86 PID 2252 wrote to memory of 4660 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 86 PID 2252 wrote to memory of 3632 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 87 PID 2252 wrote to memory of 3632 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 87 PID 2252 wrote to memory of 5080 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 88 PID 2252 wrote to memory of 5080 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 88 PID 2252 wrote to memory of 4340 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 89 PID 2252 wrote to memory of 4340 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 89 PID 2252 wrote to memory of 4368 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 90 PID 2252 wrote to memory of 4368 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 90 PID 2252 wrote to memory of 3952 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 91 PID 2252 wrote to memory of 3952 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 91 PID 2252 wrote to memory of 4244 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 92 PID 2252 wrote to memory of 4244 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 92 PID 2252 wrote to memory of 3188 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 93 PID 2252 wrote to memory of 3188 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 93 PID 2252 wrote to memory of 2120 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 94 PID 2252 wrote to memory of 2120 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 94 PID 2252 wrote to memory of 3340 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 95 PID 2252 wrote to memory of 3340 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 95 PID 2252 wrote to memory of 1600 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 96 PID 2252 wrote to memory of 1600 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 96 PID 2252 wrote to memory of 3004 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 97 PID 2252 wrote to memory of 3004 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 97 PID 2252 wrote to memory of 4672 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 98 PID 2252 wrote to memory of 4672 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 98 PID 2252 wrote to memory of 2516 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 99 PID 2252 wrote to memory of 2516 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 99 PID 2252 wrote to memory of 5092 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 100 PID 2252 wrote to memory of 5092 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 100 PID 2252 wrote to memory of 4648 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 101 PID 2252 wrote to memory of 4648 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 101 PID 2252 wrote to memory of 4704 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 102 PID 2252 wrote to memory of 4704 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 102 PID 2252 wrote to memory of 4724 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 103 PID 2252 wrote to memory of 4724 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 103 PID 2252 wrote to memory of 5060 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 104 PID 2252 wrote to memory of 5060 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 104 PID 2252 wrote to memory of 4968 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 105 PID 2252 wrote to memory of 4968 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 105 PID 2252 wrote to memory of 2484 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 106 PID 2252 wrote to memory of 2484 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 106 PID 2252 wrote to memory of 1252 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 107 PID 2252 wrote to memory of 1252 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 107 PID 2252 wrote to memory of 4788 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 108 PID 2252 wrote to memory of 4788 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 108 PID 2252 wrote to memory of 1944 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 109 PID 2252 wrote to memory of 1944 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 109 PID 2252 wrote to memory of 4512 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 110 PID 2252 wrote to memory of 4512 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 110 PID 2252 wrote to memory of 4896 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 111 PID 2252 wrote to memory of 4896 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 111 PID 2252 wrote to memory of 548 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 112 PID 2252 wrote to memory of 548 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 112 PID 2252 wrote to memory of 2196 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 113 PID 2252 wrote to memory of 2196 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 113 PID 2252 wrote to memory of 3928 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 114 PID 2252 wrote to memory of 3928 2252 c6777681840142e5a9b1533a6c5be030_NEIKI.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6777681840142e5a9b1533a6c5be030_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\c6777681840142e5a9b1533a6c5be030_NEIKI.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\System32\LRboMcN.exeC:\Windows\System32\LRboMcN.exe2⤵
- Executes dropped EXE
PID:1652
-
-
C:\Windows\System32\WchiRXO.exeC:\Windows\System32\WchiRXO.exe2⤵
- Executes dropped EXE
PID:1996
-
-
C:\Windows\System32\ZXnUXDw.exeC:\Windows\System32\ZXnUXDw.exe2⤵
- Executes dropped EXE
PID:2384
-
-
C:\Windows\System32\euEBaxs.exeC:\Windows\System32\euEBaxs.exe2⤵
- Executes dropped EXE
PID:4660
-
-
C:\Windows\System32\CvzkAJB.exeC:\Windows\System32\CvzkAJB.exe2⤵
- Executes dropped EXE
PID:3632
-
-
C:\Windows\System32\JSEdndg.exeC:\Windows\System32\JSEdndg.exe2⤵
- Executes dropped EXE
PID:5080
-
-
C:\Windows\System32\rLpNdaO.exeC:\Windows\System32\rLpNdaO.exe2⤵
- Executes dropped EXE
PID:4340
-
-
C:\Windows\System32\cjSNIWw.exeC:\Windows\System32\cjSNIWw.exe2⤵
- Executes dropped EXE
PID:4368
-
-
C:\Windows\System32\wGTBIqE.exeC:\Windows\System32\wGTBIqE.exe2⤵
- Executes dropped EXE
PID:3952
-
-
C:\Windows\System32\niiLZsl.exeC:\Windows\System32\niiLZsl.exe2⤵
- Executes dropped EXE
PID:4244
-
-
C:\Windows\System32\YPIwNuT.exeC:\Windows\System32\YPIwNuT.exe2⤵
- Executes dropped EXE
PID:3188
-
-
C:\Windows\System32\CpsoxbL.exeC:\Windows\System32\CpsoxbL.exe2⤵
- Executes dropped EXE
PID:2120
-
-
C:\Windows\System32\GPEhDYy.exeC:\Windows\System32\GPEhDYy.exe2⤵
- Executes dropped EXE
PID:3340
-
-
C:\Windows\System32\RCYENms.exeC:\Windows\System32\RCYENms.exe2⤵
- Executes dropped EXE
PID:1600
-
-
C:\Windows\System32\ygBclbU.exeC:\Windows\System32\ygBclbU.exe2⤵
- Executes dropped EXE
PID:3004
-
-
C:\Windows\System32\iUZyDUe.exeC:\Windows\System32\iUZyDUe.exe2⤵
- Executes dropped EXE
PID:4672
-
-
C:\Windows\System32\RPKNPHY.exeC:\Windows\System32\RPKNPHY.exe2⤵
- Executes dropped EXE
PID:2516
-
-
C:\Windows\System32\GkaiXHx.exeC:\Windows\System32\GkaiXHx.exe2⤵
- Executes dropped EXE
PID:5092
-
-
C:\Windows\System32\OyvnEBQ.exeC:\Windows\System32\OyvnEBQ.exe2⤵
- Executes dropped EXE
PID:4648
-
-
C:\Windows\System32\SHoCdhK.exeC:\Windows\System32\SHoCdhK.exe2⤵
- Executes dropped EXE
PID:4704
-
-
C:\Windows\System32\nkdemCn.exeC:\Windows\System32\nkdemCn.exe2⤵
- Executes dropped EXE
PID:4724
-
-
C:\Windows\System32\nOXcPQy.exeC:\Windows\System32\nOXcPQy.exe2⤵
- Executes dropped EXE
PID:5060
-
-
C:\Windows\System32\PehKLOK.exeC:\Windows\System32\PehKLOK.exe2⤵
- Executes dropped EXE
PID:4968
-
-
C:\Windows\System32\ePsAYbB.exeC:\Windows\System32\ePsAYbB.exe2⤵
- Executes dropped EXE
PID:2484
-
-
C:\Windows\System32\UkqAXrQ.exeC:\Windows\System32\UkqAXrQ.exe2⤵
- Executes dropped EXE
PID:1252
-
-
C:\Windows\System32\WcdklGr.exeC:\Windows\System32\WcdklGr.exe2⤵
- Executes dropped EXE
PID:4788
-
-
C:\Windows\System32\OqAgtVn.exeC:\Windows\System32\OqAgtVn.exe2⤵
- Executes dropped EXE
PID:1944
-
-
C:\Windows\System32\bbsSpXB.exeC:\Windows\System32\bbsSpXB.exe2⤵
- Executes dropped EXE
PID:4512
-
-
C:\Windows\System32\dbdGQzA.exeC:\Windows\System32\dbdGQzA.exe2⤵
- Executes dropped EXE
PID:4896
-
-
C:\Windows\System32\kVJThVE.exeC:\Windows\System32\kVJThVE.exe2⤵
- Executes dropped EXE
PID:548
-
-
C:\Windows\System32\fbjRQke.exeC:\Windows\System32\fbjRQke.exe2⤵
- Executes dropped EXE
PID:2196
-
-
C:\Windows\System32\AcTlGCa.exeC:\Windows\System32\AcTlGCa.exe2⤵
- Executes dropped EXE
PID:3928
-
-
C:\Windows\System32\lqgiCkX.exeC:\Windows\System32\lqgiCkX.exe2⤵
- Executes dropped EXE
PID:1332
-
-
C:\Windows\System32\dCGIghW.exeC:\Windows\System32\dCGIghW.exe2⤵
- Executes dropped EXE
PID:1352
-
-
C:\Windows\System32\ihanwic.exeC:\Windows\System32\ihanwic.exe2⤵
- Executes dropped EXE
PID:1732
-
-
C:\Windows\System32\ONfXmCX.exeC:\Windows\System32\ONfXmCX.exe2⤵
- Executes dropped EXE
PID:4688
-
-
C:\Windows\System32\LzujTlU.exeC:\Windows\System32\LzujTlU.exe2⤵
- Executes dropped EXE
PID:5100
-
-
C:\Windows\System32\sbdTWXb.exeC:\Windows\System32\sbdTWXb.exe2⤵
- Executes dropped EXE
PID:5012
-
-
C:\Windows\System32\DqREBTF.exeC:\Windows\System32\DqREBTF.exe2⤵
- Executes dropped EXE
PID:2444
-
-
C:\Windows\System32\wUswiTw.exeC:\Windows\System32\wUswiTw.exe2⤵
- Executes dropped EXE
PID:4824
-
-
C:\Windows\System32\voMqzBo.exeC:\Windows\System32\voMqzBo.exe2⤵
- Executes dropped EXE
PID:412
-
-
C:\Windows\System32\bXiYDEK.exeC:\Windows\System32\bXiYDEK.exe2⤵
- Executes dropped EXE
PID:3724
-
-
C:\Windows\System32\FLWfggK.exeC:\Windows\System32\FLWfggK.exe2⤵
- Executes dropped EXE
PID:4128
-
-
C:\Windows\System32\lYTwUdF.exeC:\Windows\System32\lYTwUdF.exe2⤵
- Executes dropped EXE
PID:4240
-
-
C:\Windows\System32\cyHdfzR.exeC:\Windows\System32\cyHdfzR.exe2⤵
- Executes dropped EXE
PID:2940
-
-
C:\Windows\System32\EVFUBRP.exeC:\Windows\System32\EVFUBRP.exe2⤵
- Executes dropped EXE
PID:1920
-
-
C:\Windows\System32\cFgdnsX.exeC:\Windows\System32\cFgdnsX.exe2⤵
- Executes dropped EXE
PID:3348
-
-
C:\Windows\System32\VnyyoRN.exeC:\Windows\System32\VnyyoRN.exe2⤵
- Executes dropped EXE
PID:3740
-
-
C:\Windows\System32\CtOVMhu.exeC:\Windows\System32\CtOVMhu.exe2⤵
- Executes dropped EXE
PID:4276
-
-
C:\Windows\System32\JZTNZOQ.exeC:\Windows\System32\JZTNZOQ.exe2⤵
- Executes dropped EXE
PID:212
-
-
C:\Windows\System32\AHbcnTQ.exeC:\Windows\System32\AHbcnTQ.exe2⤵
- Executes dropped EXE
PID:3296
-
-
C:\Windows\System32\VxgARUy.exeC:\Windows\System32\VxgARUy.exe2⤵
- Executes dropped EXE
PID:4328
-
-
C:\Windows\System32\jcnPppw.exeC:\Windows\System32\jcnPppw.exe2⤵
- Executes dropped EXE
PID:4732
-
-
C:\Windows\System32\dlVaako.exeC:\Windows\System32\dlVaako.exe2⤵
- Executes dropped EXE
PID:5000
-
-
C:\Windows\System32\iBTzCzC.exeC:\Windows\System32\iBTzCzC.exe2⤵
- Executes dropped EXE
PID:740
-
-
C:\Windows\System32\oFSgTKQ.exeC:\Windows\System32\oFSgTKQ.exe2⤵
- Executes dropped EXE
PID:2408
-
-
C:\Windows\System32\QnWtzju.exeC:\Windows\System32\QnWtzju.exe2⤵
- Executes dropped EXE
PID:3372
-
-
C:\Windows\System32\kCyyGkJ.exeC:\Windows\System32\kCyyGkJ.exe2⤵
- Executes dropped EXE
PID:1916
-
-
C:\Windows\System32\mgkcrcj.exeC:\Windows\System32\mgkcrcj.exe2⤵
- Executes dropped EXE
PID:916
-
-
C:\Windows\System32\XwadKjZ.exeC:\Windows\System32\XwadKjZ.exe2⤵
- Executes dropped EXE
PID:2348
-
-
C:\Windows\System32\uUJPgYf.exeC:\Windows\System32\uUJPgYf.exe2⤵
- Executes dropped EXE
PID:804
-
-
C:\Windows\System32\ezPAMHc.exeC:\Windows\System32\ezPAMHc.exe2⤵
- Executes dropped EXE
PID:3000
-
-
C:\Windows\System32\XNOtOWZ.exeC:\Windows\System32\XNOtOWZ.exe2⤵
- Executes dropped EXE
PID:3652
-
-
C:\Windows\System32\fWEAHZo.exeC:\Windows\System32\fWEAHZo.exe2⤵
- Executes dropped EXE
PID:640
-
-
C:\Windows\System32\hDeqHRC.exeC:\Windows\System32\hDeqHRC.exe2⤵PID:624
-
-
C:\Windows\System32\phoJcwU.exeC:\Windows\System32\phoJcwU.exe2⤵PID:5116
-
-
C:\Windows\System32\ojWkMib.exeC:\Windows\System32\ojWkMib.exe2⤵PID:4048
-
-
C:\Windows\System32\zcfYZii.exeC:\Windows\System32\zcfYZii.exe2⤵PID:1768
-
-
C:\Windows\System32\mCQjLNA.exeC:\Windows\System32\mCQjLNA.exe2⤵PID:3292
-
-
C:\Windows\System32\SMhRWqB.exeC:\Windows\System32\SMhRWqB.exe2⤵PID:1784
-
-
C:\Windows\System32\XMbdzfA.exeC:\Windows\System32\XMbdzfA.exe2⤵PID:3828
-
-
C:\Windows\System32\pmIYEXN.exeC:\Windows\System32\pmIYEXN.exe2⤵PID:4884
-
-
C:\Windows\System32\AhnjWFJ.exeC:\Windows\System32\AhnjWFJ.exe2⤵PID:2428
-
-
C:\Windows\System32\cUmhUey.exeC:\Windows\System32\cUmhUey.exe2⤵PID:4076
-
-
C:\Windows\System32\RKPwlEW.exeC:\Windows\System32\RKPwlEW.exe2⤵PID:4700
-
-
C:\Windows\System32\ohbhKaK.exeC:\Windows\System32\ohbhKaK.exe2⤵PID:2340
-
-
C:\Windows\System32\aRUQorT.exeC:\Windows\System32\aRUQorT.exe2⤵PID:1012
-
-
C:\Windows\System32\WoVwOjg.exeC:\Windows\System32\WoVwOjg.exe2⤵PID:2076
-
-
C:\Windows\System32\JfXiraN.exeC:\Windows\System32\JfXiraN.exe2⤵PID:4224
-
-
C:\Windows\System32\isVzhKg.exeC:\Windows\System32\isVzhKg.exe2⤵PID:4908
-
-
C:\Windows\System32\zxPHLly.exeC:\Windows\System32\zxPHLly.exe2⤵PID:4064
-
-
C:\Windows\System32\xzSxxRb.exeC:\Windows\System32\xzSxxRb.exe2⤵PID:1936
-
-
C:\Windows\System32\RRmNDYJ.exeC:\Windows\System32\RRmNDYJ.exe2⤵PID:5124
-
-
C:\Windows\System32\gHLTXtA.exeC:\Windows\System32\gHLTXtA.exe2⤵PID:5152
-
-
C:\Windows\System32\DkuAIOx.exeC:\Windows\System32\DkuAIOx.exe2⤵PID:5180
-
-
C:\Windows\System32\qFzwbpZ.exeC:\Windows\System32\qFzwbpZ.exe2⤵PID:5208
-
-
C:\Windows\System32\kdvPPZf.exeC:\Windows\System32\kdvPPZf.exe2⤵PID:5236
-
-
C:\Windows\System32\LvELcJG.exeC:\Windows\System32\LvELcJG.exe2⤵PID:5264
-
-
C:\Windows\System32\kFybGXE.exeC:\Windows\System32\kFybGXE.exe2⤵PID:5292
-
-
C:\Windows\System32\dYPXkGp.exeC:\Windows\System32\dYPXkGp.exe2⤵PID:5320
-
-
C:\Windows\System32\yvmZNRK.exeC:\Windows\System32\yvmZNRK.exe2⤵PID:5348
-
-
C:\Windows\System32\NZjQUIO.exeC:\Windows\System32\NZjQUIO.exe2⤵PID:5376
-
-
C:\Windows\System32\qGnxRfi.exeC:\Windows\System32\qGnxRfi.exe2⤵PID:5416
-
-
C:\Windows\System32\gMRfnYb.exeC:\Windows\System32\gMRfnYb.exe2⤵PID:5432
-
-
C:\Windows\System32\BDbfkwk.exeC:\Windows\System32\BDbfkwk.exe2⤵PID:5460
-
-
C:\Windows\System32\RUEZSgY.exeC:\Windows\System32\RUEZSgY.exe2⤵PID:5488
-
-
C:\Windows\System32\vvCJdlM.exeC:\Windows\System32\vvCJdlM.exe2⤵PID:5516
-
-
C:\Windows\System32\Qwmxwft.exeC:\Windows\System32\Qwmxwft.exe2⤵PID:5552
-
-
C:\Windows\System32\ONCliWZ.exeC:\Windows\System32\ONCliWZ.exe2⤵PID:5572
-
-
C:\Windows\System32\GmwvVGu.exeC:\Windows\System32\GmwvVGu.exe2⤵PID:5600
-
-
C:\Windows\System32\UZuGFpH.exeC:\Windows\System32\UZuGFpH.exe2⤵PID:5628
-
-
C:\Windows\System32\lYJRFgs.exeC:\Windows\System32\lYJRFgs.exe2⤵PID:5656
-
-
C:\Windows\System32\UIdXVVD.exeC:\Windows\System32\UIdXVVD.exe2⤵PID:5684
-
-
C:\Windows\System32\VLLtnlj.exeC:\Windows\System32\VLLtnlj.exe2⤵PID:5712
-
-
C:\Windows\System32\snCImZP.exeC:\Windows\System32\snCImZP.exe2⤵PID:5752
-
-
C:\Windows\System32\GDUCAln.exeC:\Windows\System32\GDUCAln.exe2⤵PID:5768
-
-
C:\Windows\System32\QkAEwZM.exeC:\Windows\System32\QkAEwZM.exe2⤵PID:5796
-
-
C:\Windows\System32\kBfsLOS.exeC:\Windows\System32\kBfsLOS.exe2⤵PID:5824
-
-
C:\Windows\System32\QXYupeQ.exeC:\Windows\System32\QXYupeQ.exe2⤵PID:5852
-
-
C:\Windows\System32\LQTbTLq.exeC:\Windows\System32\LQTbTLq.exe2⤵PID:5880
-
-
C:\Windows\System32\LblENnJ.exeC:\Windows\System32\LblENnJ.exe2⤵PID:5908
-
-
C:\Windows\System32\ENVnlxX.exeC:\Windows\System32\ENVnlxX.exe2⤵PID:5936
-
-
C:\Windows\System32\PywoYzt.exeC:\Windows\System32\PywoYzt.exe2⤵PID:5964
-
-
C:\Windows\System32\wzgXtpb.exeC:\Windows\System32\wzgXtpb.exe2⤵PID:5992
-
-
C:\Windows\System32\jyTwreH.exeC:\Windows\System32\jyTwreH.exe2⤵PID:6020
-
-
C:\Windows\System32\egCWjXs.exeC:\Windows\System32\egCWjXs.exe2⤵PID:6048
-
-
C:\Windows\System32\YlzBSVK.exeC:\Windows\System32\YlzBSVK.exe2⤵PID:6076
-
-
C:\Windows\System32\zKgfuxf.exeC:\Windows\System32\zKgfuxf.exe2⤵PID:6104
-
-
C:\Windows\System32\rsCqEAR.exeC:\Windows\System32\rsCqEAR.exe2⤵PID:6132
-
-
C:\Windows\System32\OFKZMZy.exeC:\Windows\System32\OFKZMZy.exe2⤵PID:2788
-
-
C:\Windows\System32\wszXVuM.exeC:\Windows\System32\wszXVuM.exe2⤵PID:1108
-
-
C:\Windows\System32\dpLyocT.exeC:\Windows\System32\dpLyocT.exe2⤵PID:1204
-
-
C:\Windows\System32\frtaTgC.exeC:\Windows\System32\frtaTgC.exe2⤵PID:4208
-
-
C:\Windows\System32\NyneHCc.exeC:\Windows\System32\NyneHCc.exe2⤵PID:2492
-
-
C:\Windows\System32\QyLEOtO.exeC:\Windows\System32\QyLEOtO.exe2⤵PID:5144
-
-
C:\Windows\System32\LoFsdHh.exeC:\Windows\System32\LoFsdHh.exe2⤵PID:5200
-
-
C:\Windows\System32\oIyMdzU.exeC:\Windows\System32\oIyMdzU.exe2⤵PID:5244
-
-
C:\Windows\System32\OUXFSiR.exeC:\Windows\System32\OUXFSiR.exe2⤵PID:5340
-
-
C:\Windows\System32\yuMTWKv.exeC:\Windows\System32\yuMTWKv.exe2⤵PID:5396
-
-
C:\Windows\System32\zWdgqmB.exeC:\Windows\System32\zWdgqmB.exe2⤵PID:5440
-
-
C:\Windows\System32\ErngPXK.exeC:\Windows\System32\ErngPXK.exe2⤵PID:5524
-
-
C:\Windows\System32\rjctcaC.exeC:\Windows\System32\rjctcaC.exe2⤵PID:5612
-
-
C:\Windows\System32\mqLPxPL.exeC:\Windows\System32\mqLPxPL.exe2⤵PID:5648
-
-
C:\Windows\System32\tAMYZmg.exeC:\Windows\System32\tAMYZmg.exe2⤵PID:5732
-
-
C:\Windows\System32\emYLxnY.exeC:\Windows\System32\emYLxnY.exe2⤵PID:5780
-
-
C:\Windows\System32\CdoDvpS.exeC:\Windows\System32\CdoDvpS.exe2⤵PID:5832
-
-
C:\Windows\System32\OGLojXD.exeC:\Windows\System32\OGLojXD.exe2⤵PID:5928
-
-
C:\Windows\System32\VHzLlJz.exeC:\Windows\System32\VHzLlJz.exe2⤵PID:5976
-
-
C:\Windows\System32\GlMlnow.exeC:\Windows\System32\GlMlnow.exe2⤵PID:6032
-
-
C:\Windows\System32\ofVpTFd.exeC:\Windows\System32\ofVpTFd.exe2⤵PID:6124
-
-
C:\Windows\System32\HOZzces.exeC:\Windows\System32\HOZzces.exe2⤵PID:2176
-
-
C:\Windows\System32\hQACuIe.exeC:\Windows\System32\hQACuIe.exe2⤵PID:3260
-
-
C:\Windows\System32\TtjHdyr.exeC:\Windows\System32\TtjHdyr.exe2⤵PID:1756
-
-
C:\Windows\System32\LbKYgae.exeC:\Windows\System32\LbKYgae.exe2⤵PID:5276
-
-
C:\Windows\System32\GVcHzLF.exeC:\Windows\System32\GVcHzLF.exe2⤵PID:5424
-
-
C:\Windows\System32\dkkRKsX.exeC:\Windows\System32\dkkRKsX.exe2⤵PID:5536
-
-
C:\Windows\System32\fIOEcQR.exeC:\Windows\System32\fIOEcQR.exe2⤵PID:5764
-
-
C:\Windows\System32\EZlWdvO.exeC:\Windows\System32\EZlWdvO.exe2⤵PID:5872
-
-
C:\Windows\System32\jrFDsFH.exeC:\Windows\System32\jrFDsFH.exe2⤵PID:6000
-
-
C:\Windows\System32\IJxnXDw.exeC:\Windows\System32\IJxnXDw.exe2⤵PID:6156
-
-
C:\Windows\System32\CkMhXPV.exeC:\Windows\System32\CkMhXPV.exe2⤵PID:6184
-
-
C:\Windows\System32\xGJSqNa.exeC:\Windows\System32\xGJSqNa.exe2⤵PID:6224
-
-
C:\Windows\System32\VWJhmvI.exeC:\Windows\System32\VWJhmvI.exe2⤵PID:6240
-
-
C:\Windows\System32\xAyuecu.exeC:\Windows\System32\xAyuecu.exe2⤵PID:6268
-
-
C:\Windows\System32\ZQlfgXB.exeC:\Windows\System32\ZQlfgXB.exe2⤵PID:6296
-
-
C:\Windows\System32\sgNoTMU.exeC:\Windows\System32\sgNoTMU.exe2⤵PID:6324
-
-
C:\Windows\System32\MkVIIMm.exeC:\Windows\System32\MkVIIMm.exe2⤵PID:6352
-
-
C:\Windows\System32\ridetaX.exeC:\Windows\System32\ridetaX.exe2⤵PID:6380
-
-
C:\Windows\System32\FNvInRo.exeC:\Windows\System32\FNvInRo.exe2⤵PID:6408
-
-
C:\Windows\System32\JDVewjI.exeC:\Windows\System32\JDVewjI.exe2⤵PID:6436
-
-
C:\Windows\System32\LZsDAyP.exeC:\Windows\System32\LZsDAyP.exe2⤵PID:6464
-
-
C:\Windows\System32\fooDKOv.exeC:\Windows\System32\fooDKOv.exe2⤵PID:6492
-
-
C:\Windows\System32\NBknnvl.exeC:\Windows\System32\NBknnvl.exe2⤵PID:6532
-
-
C:\Windows\System32\lUFOkqO.exeC:\Windows\System32\lUFOkqO.exe2⤵PID:6548
-
-
C:\Windows\System32\OyjeqJl.exeC:\Windows\System32\OyjeqJl.exe2⤵PID:6576
-
-
C:\Windows\System32\LHNpgoD.exeC:\Windows\System32\LHNpgoD.exe2⤵PID:6604
-
-
C:\Windows\System32\EnUdFjx.exeC:\Windows\System32\EnUdFjx.exe2⤵PID:6632
-
-
C:\Windows\System32\CpHmjkt.exeC:\Windows\System32\CpHmjkt.exe2⤵PID:6660
-
-
C:\Windows\System32\PhSMRtM.exeC:\Windows\System32\PhSMRtM.exe2⤵PID:6688
-
-
C:\Windows\System32\hfEdsnH.exeC:\Windows\System32\hfEdsnH.exe2⤵PID:6728
-
-
C:\Windows\System32\HpfBFTt.exeC:\Windows\System32\HpfBFTt.exe2⤵PID:6744
-
-
C:\Windows\System32\FkPXCus.exeC:\Windows\System32\FkPXCus.exe2⤵PID:6772
-
-
C:\Windows\System32\hkCPCjT.exeC:\Windows\System32\hkCPCjT.exe2⤵PID:6800
-
-
C:\Windows\System32\jdoZGGD.exeC:\Windows\System32\jdoZGGD.exe2⤵PID:6828
-
-
C:\Windows\System32\XfNSUKI.exeC:\Windows\System32\XfNSUKI.exe2⤵PID:6856
-
-
C:\Windows\System32\TiVdLrk.exeC:\Windows\System32\TiVdLrk.exe2⤵PID:6884
-
-
C:\Windows\System32\RJoGxBc.exeC:\Windows\System32\RJoGxBc.exe2⤵PID:6912
-
-
C:\Windows\System32\gUvtjyh.exeC:\Windows\System32\gUvtjyh.exe2⤵PID:6940
-
-
C:\Windows\System32\mwXFNXd.exeC:\Windows\System32\mwXFNXd.exe2⤵PID:6968
-
-
C:\Windows\System32\lwYLJyD.exeC:\Windows\System32\lwYLJyD.exe2⤵PID:6996
-
-
C:\Windows\System32\KysFNSb.exeC:\Windows\System32\KysFNSb.exe2⤵PID:7024
-
-
C:\Windows\System32\MOOvKaT.exeC:\Windows\System32\MOOvKaT.exe2⤵PID:7052
-
-
C:\Windows\System32\zFtwWzW.exeC:\Windows\System32\zFtwWzW.exe2⤵PID:7080
-
-
C:\Windows\System32\IEjSHmc.exeC:\Windows\System32\IEjSHmc.exe2⤵PID:7108
-
-
C:\Windows\System32\HzXwCfD.exeC:\Windows\System32\HzXwCfD.exe2⤵PID:7136
-
-
C:\Windows\System32\rKRpZlg.exeC:\Windows\System32\rKRpZlg.exe2⤵PID:7164
-
-
C:\Windows\System32\shyodwY.exeC:\Windows\System32\shyodwY.exe2⤵PID:5160
-
-
C:\Windows\System32\GimKAMl.exeC:\Windows\System32\GimKAMl.exe2⤵PID:5560
-
-
C:\Windows\System32\JoaBjXA.exeC:\Windows\System32\JoaBjXA.exe2⤵PID:5720
-
-
C:\Windows\System32\rWWWxAQ.exeC:\Windows\System32\rWWWxAQ.exe2⤵PID:6056
-
-
C:\Windows\System32\QkNCZHE.exeC:\Windows\System32\QkNCZHE.exe2⤵PID:6196
-
-
C:\Windows\System32\ENjJDgF.exeC:\Windows\System32\ENjJDgF.exe2⤵PID:6260
-
-
C:\Windows\System32\SLtqeuO.exeC:\Windows\System32\SLtqeuO.exe2⤵PID:1656
-
-
C:\Windows\System32\yfjdZOJ.exeC:\Windows\System32\yfjdZOJ.exe2⤵PID:6388
-
-
C:\Windows\System32\rPhKJxL.exeC:\Windows\System32\rPhKJxL.exe2⤵PID:6448
-
-
C:\Windows\System32\UowpAly.exeC:\Windows\System32\UowpAly.exe2⤵PID:6504
-
-
C:\Windows\System32\FNOjVDt.exeC:\Windows\System32\FNOjVDt.exe2⤵PID:6556
-
-
C:\Windows\System32\elbhAuH.exeC:\Windows\System32\elbhAuH.exe2⤵PID:6640
-
-
C:\Windows\System32\vuRoQXl.exeC:\Windows\System32\vuRoQXl.exe2⤵PID:6708
-
-
C:\Windows\System32\rjQynBJ.exeC:\Windows\System32\rjQynBJ.exe2⤵PID:6752
-
-
C:\Windows\System32\WkBQFEW.exeC:\Windows\System32\WkBQFEW.exe2⤵PID:6836
-
-
C:\Windows\System32\aUuCvzS.exeC:\Windows\System32\aUuCvzS.exe2⤵PID:6896
-
-
C:\Windows\System32\PnNHYJU.exeC:\Windows\System32\PnNHYJU.exe2⤵PID:6952
-
-
C:\Windows\System32\qKazIzW.exeC:\Windows\System32\qKazIzW.exe2⤵PID:7008
-
-
C:\Windows\System32\XPHWeYQ.exeC:\Windows\System32\XPHWeYQ.exe2⤵PID:7088
-
-
C:\Windows\System32\jmLvegZ.exeC:\Windows\System32\jmLvegZ.exe2⤵PID:7148
-
-
C:\Windows\System32\XfPCYRT.exeC:\Windows\System32\XfPCYRT.exe2⤵PID:5328
-
-
C:\Windows\System32\IaZyGCr.exeC:\Windows\System32\IaZyGCr.exe2⤵PID:5920
-
-
C:\Windows\System32\AicVANC.exeC:\Windows\System32\AicVANC.exe2⤵PID:3748
-
-
C:\Windows\System32\ByzVcBf.exeC:\Windows\System32\ByzVcBf.exe2⤵PID:6336
-
-
C:\Windows\System32\ayHrSVB.exeC:\Windows\System32\ayHrSVB.exe2⤵PID:6512
-
-
C:\Windows\System32\SJOEvOe.exeC:\Windows\System32\SJOEvOe.exe2⤵PID:6680
-
-
C:\Windows\System32\SaoGexL.exeC:\Windows\System32\SaoGexL.exe2⤵PID:6864
-
-
C:\Windows\System32\kXOcosR.exeC:\Windows\System32\kXOcosR.exe2⤵PID:6980
-
-
C:\Windows\System32\eaxHvtY.exeC:\Windows\System32\eaxHvtY.exe2⤵PID:7120
-
-
C:\Windows\System32\TCSSiLh.exeC:\Windows\System32\TCSSiLh.exe2⤵PID:5640
-
-
C:\Windows\System32\BGzxujG.exeC:\Windows\System32\BGzxujG.exe2⤵PID:7180
-
-
C:\Windows\System32\YcHGVEb.exeC:\Windows\System32\YcHGVEb.exe2⤵PID:7208
-
-
C:\Windows\System32\EYxRRHK.exeC:\Windows\System32\EYxRRHK.exe2⤵PID:7232
-
-
C:\Windows\System32\mtaPmgP.exeC:\Windows\System32\mtaPmgP.exe2⤵PID:7264
-
-
C:\Windows\System32\ZFJPNzq.exeC:\Windows\System32\ZFJPNzq.exe2⤵PID:7292
-
-
C:\Windows\System32\IBjMIsg.exeC:\Windows\System32\IBjMIsg.exe2⤵PID:7320
-
-
C:\Windows\System32\rYhLTtd.exeC:\Windows\System32\rYhLTtd.exe2⤵PID:7344
-
-
C:\Windows\System32\OiAfQtT.exeC:\Windows\System32\OiAfQtT.exe2⤵PID:7376
-
-
C:\Windows\System32\BhxnPqG.exeC:\Windows\System32\BhxnPqG.exe2⤵PID:7404
-
-
C:\Windows\System32\OZSteXN.exeC:\Windows\System32\OZSteXN.exe2⤵PID:7432
-
-
C:\Windows\System32\JRaDJnM.exeC:\Windows\System32\JRaDJnM.exe2⤵PID:7460
-
-
C:\Windows\System32\tkBnLFv.exeC:\Windows\System32\tkBnLFv.exe2⤵PID:7488
-
-
C:\Windows\System32\cfJHlsC.exeC:\Windows\System32\cfJHlsC.exe2⤵PID:7516
-
-
C:\Windows\System32\LTnEUgL.exeC:\Windows\System32\LTnEUgL.exe2⤵PID:7544
-
-
C:\Windows\System32\qYaRFxV.exeC:\Windows\System32\qYaRFxV.exe2⤵PID:7572
-
-
C:\Windows\System32\bHkkIFy.exeC:\Windows\System32\bHkkIFy.exe2⤵PID:7596
-
-
C:\Windows\System32\wrGTRhu.exeC:\Windows\System32\wrGTRhu.exe2⤵PID:7628
-
-
C:\Windows\System32\krlIWbe.exeC:\Windows\System32\krlIWbe.exe2⤵PID:7656
-
-
C:\Windows\System32\LpvmoPF.exeC:\Windows\System32\LpvmoPF.exe2⤵PID:7684
-
-
C:\Windows\System32\QYVoZyn.exeC:\Windows\System32\QYVoZyn.exe2⤵PID:7712
-
-
C:\Windows\System32\qRhNYJU.exeC:\Windows\System32\qRhNYJU.exe2⤵PID:7740
-
-
C:\Windows\System32\hLdpUUI.exeC:\Windows\System32\hLdpUUI.exe2⤵PID:7768
-
-
C:\Windows\System32\eplbOpg.exeC:\Windows\System32\eplbOpg.exe2⤵PID:7796
-
-
C:\Windows\System32\uXKrUDM.exeC:\Windows\System32\uXKrUDM.exe2⤵PID:7824
-
-
C:\Windows\System32\qlUqZyp.exeC:\Windows\System32\qlUqZyp.exe2⤵PID:7852
-
-
C:\Windows\System32\UOWfHwi.exeC:\Windows\System32\UOWfHwi.exe2⤵PID:7880
-
-
C:\Windows\System32\ELJaZei.exeC:\Windows\System32\ELJaZei.exe2⤵PID:7908
-
-
C:\Windows\System32\OOZWPkI.exeC:\Windows\System32\OOZWPkI.exe2⤵PID:7932
-
-
C:\Windows\System32\AfqAjFv.exeC:\Windows\System32\AfqAjFv.exe2⤵PID:8040
-
-
C:\Windows\System32\vubxfXV.exeC:\Windows\System32\vubxfXV.exe2⤵PID:8068
-
-
C:\Windows\System32\oLPVBLg.exeC:\Windows\System32\oLPVBLg.exe2⤵PID:8092
-
-
C:\Windows\System32\TXOsMQx.exeC:\Windows\System32\TXOsMQx.exe2⤵PID:8112
-
-
C:\Windows\System32\cXDwEtj.exeC:\Windows\System32\cXDwEtj.exe2⤵PID:8128
-
-
C:\Windows\System32\UccqTvE.exeC:\Windows\System32\UccqTvE.exe2⤵PID:8152
-
-
C:\Windows\System32\uTFrhLJ.exeC:\Windows\System32\uTFrhLJ.exe2⤵PID:6276
-
-
C:\Windows\System32\scEMJCy.exeC:\Windows\System32\scEMJCy.exe2⤵PID:2496
-
-
C:\Windows\System32\bFCDJSh.exeC:\Windows\System32\bFCDJSh.exe2⤵PID:6740
-
-
C:\Windows\System32\dKOLOEc.exeC:\Windows\System32\dKOLOEc.exe2⤵PID:6932
-
-
C:\Windows\System32\tTvqgmZ.exeC:\Windows\System32\tTvqgmZ.exe2⤵PID:7188
-
-
C:\Windows\System32\bqkLutU.exeC:\Windows\System32\bqkLutU.exe2⤵PID:7312
-
-
C:\Windows\System32\jyCrpei.exeC:\Windows\System32\jyCrpei.exe2⤵PID:3964
-
-
C:\Windows\System32\pPmRmbE.exeC:\Windows\System32\pPmRmbE.exe2⤵PID:7384
-
-
C:\Windows\System32\juwTsZI.exeC:\Windows\System32\juwTsZI.exe2⤵PID:7452
-
-
C:\Windows\System32\MzgAnNQ.exeC:\Windows\System32\MzgAnNQ.exe2⤵PID:4980
-
-
C:\Windows\System32\ZvvkKgO.exeC:\Windows\System32\ZvvkKgO.exe2⤵PID:7524
-
-
C:\Windows\System32\eZdZzGU.exeC:\Windows\System32\eZdZzGU.exe2⤵PID:7580
-
-
C:\Windows\System32\usxTOaw.exeC:\Windows\System32\usxTOaw.exe2⤵PID:964
-
-
C:\Windows\System32\cxOvijE.exeC:\Windows\System32\cxOvijE.exe2⤵PID:3328
-
-
C:\Windows\System32\gQyOKKL.exeC:\Windows\System32\gQyOKKL.exe2⤵PID:7704
-
-
C:\Windows\System32\YKpCMOx.exeC:\Windows\System32\YKpCMOx.exe2⤵PID:7788
-
-
C:\Windows\System32\plgEywg.exeC:\Windows\System32\plgEywg.exe2⤵PID:7808
-
-
C:\Windows\System32\eoWXdxz.exeC:\Windows\System32\eoWXdxz.exe2⤵PID:7892
-
-
C:\Windows\System32\wHaHNnH.exeC:\Windows\System32\wHaHNnH.exe2⤵PID:4544
-
-
C:\Windows\System32\WxlnDMV.exeC:\Windows\System32\WxlnDMV.exe2⤵PID:4004
-
-
C:\Windows\System32\VUGQroD.exeC:\Windows\System32\VUGQroD.exe2⤵PID:3840
-
-
C:\Windows\System32\lZFdJFi.exeC:\Windows\System32\lZFdJFi.exe2⤵PID:3984
-
-
C:\Windows\System32\oyvfwyX.exeC:\Windows\System32\oyvfwyX.exe2⤵PID:8052
-
-
C:\Windows\System32\evoOVcy.exeC:\Windows\System32\evoOVcy.exe2⤵PID:636
-
-
C:\Windows\System32\tltHYxP.exeC:\Windows\System32\tltHYxP.exe2⤵PID:8108
-
-
C:\Windows\System32\GmngOIY.exeC:\Windows\System32\GmngOIY.exe2⤵PID:8148
-
-
C:\Windows\System32\KNtajmf.exeC:\Windows\System32\KNtajmf.exe2⤵PID:6764
-
-
C:\Windows\System32\uHvYUsP.exeC:\Windows\System32\uHvYUsP.exe2⤵PID:7352
-
-
C:\Windows\System32\xVYvXaZ.exeC:\Windows\System32\xVYvXaZ.exe2⤵PID:7248
-
-
C:\Windows\System32\msaasyw.exeC:\Windows\System32\msaasyw.exe2⤵PID:7416
-
-
C:\Windows\System32\PTIEpGA.exeC:\Windows\System32\PTIEpGA.exe2⤵PID:8004
-
-
C:\Windows\System32\bLkDGBe.exeC:\Windows\System32\bLkDGBe.exe2⤵PID:4460
-
-
C:\Windows\System32\QMuNccn.exeC:\Windows\System32\QMuNccn.exe2⤵PID:4504
-
-
C:\Windows\System32\RsCcxYL.exeC:\Windows\System32\RsCcxYL.exe2⤵PID:7844
-
-
C:\Windows\System32\fjxcxEB.exeC:\Windows\System32\fjxcxEB.exe2⤵PID:7968
-
-
C:\Windows\System32\DlBwqqO.exeC:\Windows\System32\DlBwqqO.exe2⤵PID:7032
-
-
C:\Windows\System32\wVPESMO.exeC:\Windows\System32\wVPESMO.exe2⤵PID:7220
-
-
C:\Windows\System32\zAEFqwi.exeC:\Windows\System32\zAEFqwi.exe2⤵PID:3796
-
-
C:\Windows\System32\GjYKPSH.exeC:\Windows\System32\GjYKPSH.exe2⤵PID:8036
-
-
C:\Windows\System32\pplgxZi.exeC:\Windows\System32\pplgxZi.exe2⤵PID:1900
-
-
C:\Windows\System32\tgNfynz.exeC:\Windows\System32\tgNfynz.exe2⤵PID:4044
-
-
C:\Windows\System32\cZQvbcS.exeC:\Windows\System32\cZQvbcS.exe2⤵PID:7760
-
-
C:\Windows\System32\CzUEeIz.exeC:\Windows\System32\CzUEeIz.exe2⤵PID:1608
-
-
C:\Windows\System32\CRANHzN.exeC:\Windows\System32\CRANHzN.exe2⤵PID:7496
-
-
C:\Windows\System32\GOwPCei.exeC:\Windows\System32\GOwPCei.exe2⤵PID:7648
-
-
C:\Windows\System32\ExKngru.exeC:\Windows\System32\ExKngru.exe2⤵PID:1388
-
-
C:\Windows\System32\jMhtpgd.exeC:\Windows\System32\jMhtpgd.exe2⤵PID:752
-
-
C:\Windows\System32\wGicKxs.exeC:\Windows\System32\wGicKxs.exe2⤵PID:1888
-
-
C:\Windows\System32\WgRluBp.exeC:\Windows\System32\WgRluBp.exe2⤵PID:8236
-
-
C:\Windows\System32\pmXMcqv.exeC:\Windows\System32\pmXMcqv.exe2⤵PID:8256
-
-
C:\Windows\System32\WNRfNhN.exeC:\Windows\System32\WNRfNhN.exe2⤵PID:8292
-
-
C:\Windows\System32\GnccvNH.exeC:\Windows\System32\GnccvNH.exe2⤵PID:8312
-
-
C:\Windows\System32\fMzKBUN.exeC:\Windows\System32\fMzKBUN.exe2⤵PID:8340
-
-
C:\Windows\System32\FLwyqIY.exeC:\Windows\System32\FLwyqIY.exe2⤵PID:8372
-
-
C:\Windows\System32\VbGkWXf.exeC:\Windows\System32\VbGkWXf.exe2⤵PID:8396
-
-
C:\Windows\System32\tKLOwPz.exeC:\Windows\System32\tKLOwPz.exe2⤵PID:8412
-
-
C:\Windows\System32\bskYPyu.exeC:\Windows\System32\bskYPyu.exe2⤵PID:8440
-
-
C:\Windows\System32\BuBvOqS.exeC:\Windows\System32\BuBvOqS.exe2⤵PID:8472
-
-
C:\Windows\System32\OjlJKBf.exeC:\Windows\System32\OjlJKBf.exe2⤵PID:8512
-
-
C:\Windows\System32\IxrynrX.exeC:\Windows\System32\IxrynrX.exe2⤵PID:8532
-
-
C:\Windows\System32\grwEPWP.exeC:\Windows\System32\grwEPWP.exe2⤵PID:8568
-
-
C:\Windows\System32\heRrjct.exeC:\Windows\System32\heRrjct.exe2⤵PID:8584
-
-
C:\Windows\System32\bpWSWuF.exeC:\Windows\System32\bpWSWuF.exe2⤵PID:8624
-
-
C:\Windows\System32\ZJYjfDP.exeC:\Windows\System32\ZJYjfDP.exe2⤵PID:8656
-
-
C:\Windows\System32\TFsiTDZ.exeC:\Windows\System32\TFsiTDZ.exe2⤵PID:8684
-
-
C:\Windows\System32\drmlaQR.exeC:\Windows\System32\drmlaQR.exe2⤵PID:8712
-
-
C:\Windows\System32\JOPaJEy.exeC:\Windows\System32\JOPaJEy.exe2⤵PID:8740
-
-
C:\Windows\System32\NPxrGfo.exeC:\Windows\System32\NPxrGfo.exe2⤵PID:8768
-
-
C:\Windows\System32\BWIRQKI.exeC:\Windows\System32\BWIRQKI.exe2⤵PID:8792
-
-
C:\Windows\System32\KaLpHmy.exeC:\Windows\System32\KaLpHmy.exe2⤵PID:8812
-
-
C:\Windows\System32\qGFQNqQ.exeC:\Windows\System32\qGFQNqQ.exe2⤵PID:8852
-
-
C:\Windows\System32\JvCDeva.exeC:\Windows\System32\JvCDeva.exe2⤵PID:8880
-
-
C:\Windows\System32\bdAJiio.exeC:\Windows\System32\bdAJiio.exe2⤵PID:8908
-
-
C:\Windows\System32\KjXprDD.exeC:\Windows\System32\KjXprDD.exe2⤵PID:8924
-
-
C:\Windows\System32\picOWra.exeC:\Windows\System32\picOWra.exe2⤵PID:8956
-
-
C:\Windows\System32\HuucrFm.exeC:\Windows\System32\HuucrFm.exe2⤵PID:8992
-
-
C:\Windows\System32\bPoFhxL.exeC:\Windows\System32\bPoFhxL.exe2⤵PID:9020
-
-
C:\Windows\System32\WLRMXKd.exeC:\Windows\System32\WLRMXKd.exe2⤵PID:9064
-
-
C:\Windows\System32\xdTfAHo.exeC:\Windows\System32\xdTfAHo.exe2⤵PID:9080
-
-
C:\Windows\System32\JXFyLmz.exeC:\Windows\System32\JXFyLmz.exe2⤵PID:9108
-
-
C:\Windows\System32\jDUPfND.exeC:\Windows\System32\jDUPfND.exe2⤵PID:9136
-
-
C:\Windows\System32\IWJvHeC.exeC:\Windows\System32\IWJvHeC.exe2⤵PID:9156
-
-
C:\Windows\System32\BnLXjwh.exeC:\Windows\System32\BnLXjwh.exe2⤵PID:9192
-
-
C:\Windows\System32\UWSBAIC.exeC:\Windows\System32\UWSBAIC.exe2⤵PID:8028
-
-
C:\Windows\System32\FWItpWx.exeC:\Windows\System32\FWItpWx.exe2⤵PID:8272
-
-
C:\Windows\System32\WzZcfRR.exeC:\Windows\System32\WzZcfRR.exe2⤵PID:8324
-
-
C:\Windows\System32\imhvtmJ.exeC:\Windows\System32\imhvtmJ.exe2⤵PID:8364
-
-
C:\Windows\System32\uQVUYlg.exeC:\Windows\System32\uQVUYlg.exe2⤵PID:8404
-
-
C:\Windows\System32\cmBHXGJ.exeC:\Windows\System32\cmBHXGJ.exe2⤵PID:8508
-
-
C:\Windows\System32\koqzYiy.exeC:\Windows\System32\koqzYiy.exe2⤵PID:8552
-
-
C:\Windows\System32\jLTTVlm.exeC:\Windows\System32\jLTTVlm.exe2⤵PID:8620
-
-
C:\Windows\System32\OkjCgku.exeC:\Windows\System32\OkjCgku.exe2⤵PID:8704
-
-
C:\Windows\System32\htnRMvu.exeC:\Windows\System32\htnRMvu.exe2⤵PID:8760
-
-
C:\Windows\System32\gfaTgeZ.exeC:\Windows\System32\gfaTgeZ.exe2⤵PID:8848
-
-
C:\Windows\System32\LSoWFJM.exeC:\Windows\System32\LSoWFJM.exe2⤵PID:8140
-
-
C:\Windows\System32\bOPYegp.exeC:\Windows\System32\bOPYegp.exe2⤵PID:8984
-
-
C:\Windows\System32\kLAceXf.exeC:\Windows\System32\kLAceXf.exe2⤵PID:9060
-
-
C:\Windows\System32\TUZsVow.exeC:\Windows\System32\TUZsVow.exe2⤵PID:9120
-
-
C:\Windows\System32\dAnJCuX.exeC:\Windows\System32\dAnJCuX.exe2⤵PID:9148
-
-
C:\Windows\System32\QsuPZTG.exeC:\Windows\System32\QsuPZTG.exe2⤵PID:8248
-
-
C:\Windows\System32\PrXsSjR.exeC:\Windows\System32\PrXsSjR.exe2⤵PID:8408
-
-
C:\Windows\System32\sixXuEP.exeC:\Windows\System32\sixXuEP.exe2⤵PID:8564
-
-
C:\Windows\System32\cmfYXud.exeC:\Windows\System32\cmfYXud.exe2⤵PID:8680
-
-
C:\Windows\System32\EcOctJl.exeC:\Windows\System32\EcOctJl.exe2⤵PID:8864
-
-
C:\Windows\System32\ZOGvlGs.exeC:\Windows\System32\ZOGvlGs.exe2⤵PID:9032
-
-
C:\Windows\System32\FkvWCnV.exeC:\Windows\System32\FkvWCnV.exe2⤵PID:9188
-
-
C:\Windows\System32\YToGBxy.exeC:\Windows\System32\YToGBxy.exe2⤵PID:8424
-
-
C:\Windows\System32\qlhJuGj.exeC:\Windows\System32\qlhJuGj.exe2⤵PID:8776
-
-
C:\Windows\System32\oCUxiLn.exeC:\Windows\System32\oCUxiLn.exe2⤵PID:9144
-
-
C:\Windows\System32\xaeaiXR.exeC:\Windows\System32\xaeaiXR.exe2⤵PID:8540
-
-
C:\Windows\System32\xCTRxLN.exeC:\Windows\System32\xCTRxLN.exe2⤵PID:9220
-
-
C:\Windows\System32\rFdcgYh.exeC:\Windows\System32\rFdcgYh.exe2⤵PID:9236
-
-
C:\Windows\System32\asXMGET.exeC:\Windows\System32\asXMGET.exe2⤵PID:9288
-
-
C:\Windows\System32\YpMbslR.exeC:\Windows\System32\YpMbslR.exe2⤵PID:9304
-
-
C:\Windows\System32\jlOvsXB.exeC:\Windows\System32\jlOvsXB.exe2⤵PID:9336
-
-
C:\Windows\System32\AFnWVjC.exeC:\Windows\System32\AFnWVjC.exe2⤵PID:9364
-
-
C:\Windows\System32\mNocMGL.exeC:\Windows\System32\mNocMGL.exe2⤵PID:9384
-
-
C:\Windows\System32\QwcaXjO.exeC:\Windows\System32\QwcaXjO.exe2⤵PID:9420
-
-
C:\Windows\System32\uDMGywi.exeC:\Windows\System32\uDMGywi.exe2⤵PID:9436
-
-
C:\Windows\System32\pXViVFK.exeC:\Windows\System32\pXViVFK.exe2⤵PID:9464
-
-
C:\Windows\System32\WKIPfMN.exeC:\Windows\System32\WKIPfMN.exe2⤵PID:9504
-
-
C:\Windows\System32\rEkMFIs.exeC:\Windows\System32\rEkMFIs.exe2⤵PID:9536
-
-
C:\Windows\System32\kPuKrTF.exeC:\Windows\System32\kPuKrTF.exe2⤵PID:9552
-
-
C:\Windows\System32\TFqKofn.exeC:\Windows\System32\TFqKofn.exe2⤵PID:9588
-
-
C:\Windows\System32\xEsmydr.exeC:\Windows\System32\xEsmydr.exe2⤵PID:9616
-
-
C:\Windows\System32\vYKrAtw.exeC:\Windows\System32\vYKrAtw.exe2⤵PID:9644
-
-
C:\Windows\System32\UFgnoXf.exeC:\Windows\System32\UFgnoXf.exe2⤵PID:9668
-
-
C:\Windows\System32\PCVMOBt.exeC:\Windows\System32\PCVMOBt.exe2⤵PID:9692
-
-
C:\Windows\System32\ByFmftM.exeC:\Windows\System32\ByFmftM.exe2⤵PID:9736
-
-
C:\Windows\System32\EAzowdo.exeC:\Windows\System32\EAzowdo.exe2⤵PID:9764
-
-
C:\Windows\System32\zThtQLR.exeC:\Windows\System32\zThtQLR.exe2⤵PID:9792
-
-
C:\Windows\System32\bqwdHiq.exeC:\Windows\System32\bqwdHiq.exe2⤵PID:9824
-
-
C:\Windows\System32\uwMHwJX.exeC:\Windows\System32\uwMHwJX.exe2⤵PID:9848
-
-
C:\Windows\System32\OezwrSr.exeC:\Windows\System32\OezwrSr.exe2⤵PID:9888
-
-
C:\Windows\System32\AcPbAiW.exeC:\Windows\System32\AcPbAiW.exe2⤵PID:9912
-
-
C:\Windows\System32\weXFDDX.exeC:\Windows\System32\weXFDDX.exe2⤵PID:9928
-
-
C:\Windows\System32\vzhYKpb.exeC:\Windows\System32\vzhYKpb.exe2⤵PID:9960
-
-
C:\Windows\System32\ipNVGWn.exeC:\Windows\System32\ipNVGWn.exe2⤵PID:9988
-
-
C:\Windows\System32\awHscjt.exeC:\Windows\System32\awHscjt.exe2⤵PID:10028
-
-
C:\Windows\System32\zsaNOwA.exeC:\Windows\System32\zsaNOwA.exe2⤵PID:10068
-
-
C:\Windows\System32\KMFqbgD.exeC:\Windows\System32\KMFqbgD.exe2⤵PID:10096
-
-
C:\Windows\System32\rMptGvy.exeC:\Windows\System32\rMptGvy.exe2⤵PID:10128
-
-
C:\Windows\System32\bQqCeHT.exeC:\Windows\System32\bQqCeHT.exe2⤵PID:10152
-
-
C:\Windows\System32\TzzncAE.exeC:\Windows\System32\TzzncAE.exe2⤵PID:10180
-
-
C:\Windows\System32\YktiiHx.exeC:\Windows\System32\YktiiHx.exe2⤵PID:10200
-
-
C:\Windows\System32\hXoRkXa.exeC:\Windows\System32\hXoRkXa.exe2⤵PID:10236
-
-
C:\Windows\System32\miFZvuL.exeC:\Windows\System32\miFZvuL.exe2⤵PID:9256
-
-
C:\Windows\System32\bEfqkbE.exeC:\Windows\System32\bEfqkbE.exe2⤵PID:9328
-
-
C:\Windows\System32\HqRQgsQ.exeC:\Windows\System32\HqRQgsQ.exe2⤵PID:9412
-
-
C:\Windows\System32\bZvorfr.exeC:\Windows\System32\bZvorfr.exe2⤵PID:9484
-
-
C:\Windows\System32\qBKlaTF.exeC:\Windows\System32\qBKlaTF.exe2⤵PID:9524
-
-
C:\Windows\System32\yQLSRXt.exeC:\Windows\System32\yQLSRXt.exe2⤵PID:9596
-
-
C:\Windows\System32\HktIsMa.exeC:\Windows\System32\HktIsMa.exe2⤵PID:9660
-
-
C:\Windows\System32\RRJNzLZ.exeC:\Windows\System32\RRJNzLZ.exe2⤵PID:9748
-
-
C:\Windows\System32\LVKwqek.exeC:\Windows\System32\LVKwqek.exe2⤵PID:9868
-
-
C:\Windows\System32\MDVHJYS.exeC:\Windows\System32\MDVHJYS.exe2⤵PID:9936
-
-
C:\Windows\System32\MMBvYwJ.exeC:\Windows\System32\MMBvYwJ.exe2⤵PID:9976
-
-
C:\Windows\System32\bFnRXxO.exeC:\Windows\System32\bFnRXxO.exe2⤵PID:10084
-
-
C:\Windows\System32\dCgaBPl.exeC:\Windows\System32\dCgaBPl.exe2⤵PID:10136
-
-
C:\Windows\System32\msXOXRz.exeC:\Windows\System32\msXOXRz.exe2⤵PID:10188
-
-
C:\Windows\System32\kqzJBsC.exeC:\Windows\System32\kqzJBsC.exe2⤵PID:9300
-
-
C:\Windows\System32\rdXrUXK.exeC:\Windows\System32\rdXrUXK.exe2⤵PID:9460
-
-
C:\Windows\System32\nQaXueE.exeC:\Windows\System32\nQaXueE.exe2⤵PID:9544
-
-
C:\Windows\System32\HPKlAky.exeC:\Windows\System32\HPKlAky.exe2⤵PID:9680
-
-
C:\Windows\System32\LInTimd.exeC:\Windows\System32\LInTimd.exe2⤵PID:10060
-
-
C:\Windows\System32\qMjWdvk.exeC:\Windows\System32\qMjWdvk.exe2⤵PID:10224
-
-
C:\Windows\System32\pDxwGpX.exeC:\Windows\System32\pDxwGpX.exe2⤵PID:9372
-
-
C:\Windows\System32\MMAcIuQ.exeC:\Windows\System32\MMAcIuQ.exe2⤵PID:3012
-
-
C:\Windows\System32\pYQJJKV.exeC:\Windows\System32\pYQJJKV.exe2⤵PID:9972
-
-
C:\Windows\System32\IpUnutq.exeC:\Windows\System32\IpUnutq.exe2⤵PID:1036
-
-
C:\Windows\System32\KPRYqdd.exeC:\Windows\System32\KPRYqdd.exe2⤵PID:10108
-
-
C:\Windows\System32\FKsgaVa.exeC:\Windows\System32\FKsgaVa.exe2⤵PID:9252
-
-
C:\Windows\System32\hgcpbgu.exeC:\Windows\System32\hgcpbgu.exe2⤵PID:10272
-
-
C:\Windows\System32\LvimCRU.exeC:\Windows\System32\LvimCRU.exe2⤵PID:10292
-
-
C:\Windows\System32\QmoQVty.exeC:\Windows\System32\QmoQVty.exe2⤵PID:10312
-
-
C:\Windows\System32\jrmtgdS.exeC:\Windows\System32\jrmtgdS.exe2⤵PID:10340
-
-
C:\Windows\System32\yTzzIVZ.exeC:\Windows\System32\yTzzIVZ.exe2⤵PID:10376
-
-
C:\Windows\System32\SGoonEj.exeC:\Windows\System32\SGoonEj.exe2⤵PID:10412
-
-
C:\Windows\System32\cUAWpCM.exeC:\Windows\System32\cUAWpCM.exe2⤵PID:10444
-
-
C:\Windows\System32\xkpuckj.exeC:\Windows\System32\xkpuckj.exe2⤵PID:10472
-
-
C:\Windows\System32\gApALky.exeC:\Windows\System32\gApALky.exe2⤵PID:10492
-
-
C:\Windows\System32\rvsemEw.exeC:\Windows\System32\rvsemEw.exe2⤵PID:10520
-
-
C:\Windows\System32\hkxafYS.exeC:\Windows\System32\hkxafYS.exe2⤵PID:10544
-
-
C:\Windows\System32\VPELjgh.exeC:\Windows\System32\VPELjgh.exe2⤵PID:10584
-
-
C:\Windows\System32\RzhXGDz.exeC:\Windows\System32\RzhXGDz.exe2⤵PID:10612
-
-
C:\Windows\System32\ejOGrRo.exeC:\Windows\System32\ejOGrRo.exe2⤵PID:10628
-
-
C:\Windows\System32\yrkDnjT.exeC:\Windows\System32\yrkDnjT.exe2⤵PID:10668
-
-
C:\Windows\System32\Qvlcorc.exeC:\Windows\System32\Qvlcorc.exe2⤵PID:10688
-
-
C:\Windows\System32\pHgDMbE.exeC:\Windows\System32\pHgDMbE.exe2⤵PID:10728
-
-
C:\Windows\System32\aeoXMEi.exeC:\Windows\System32\aeoXMEi.exe2⤵PID:10748
-
-
C:\Windows\System32\TydquTC.exeC:\Windows\System32\TydquTC.exe2⤵PID:10776
-
-
C:\Windows\System32\hSYDPUy.exeC:\Windows\System32\hSYDPUy.exe2⤵PID:10804
-
-
C:\Windows\System32\fnLvuoL.exeC:\Windows\System32\fnLvuoL.exe2⤵PID:10828
-
-
C:\Windows\System32\BvWaFet.exeC:\Windows\System32\BvWaFet.exe2⤵PID:10860
-
-
C:\Windows\System32\JPdVwPM.exeC:\Windows\System32\JPdVwPM.exe2⤵PID:10900
-
-
C:\Windows\System32\ArlusJu.exeC:\Windows\System32\ArlusJu.exe2⤵PID:10932
-
-
C:\Windows\System32\yHITcvc.exeC:\Windows\System32\yHITcvc.exe2⤵PID:10956
-
-
C:\Windows\System32\tVbzEbX.exeC:\Windows\System32\tVbzEbX.exe2⤵PID:10980
-
-
C:\Windows\System32\XItEEFN.exeC:\Windows\System32\XItEEFN.exe2⤵PID:11012
-
-
C:\Windows\System32\UNlLrGY.exeC:\Windows\System32\UNlLrGY.exe2⤵PID:11032
-
-
C:\Windows\System32\jprokSp.exeC:\Windows\System32\jprokSp.exe2⤵PID:11072
-
-
C:\Windows\System32\YIGEaMw.exeC:\Windows\System32\YIGEaMw.exe2⤵PID:11088
-
-
C:\Windows\System32\CBrXQRz.exeC:\Windows\System32\CBrXQRz.exe2⤵PID:11112
-
-
C:\Windows\System32\JsdtyOM.exeC:\Windows\System32\JsdtyOM.exe2⤵PID:11144
-
-
C:\Windows\System32\sCbdSKd.exeC:\Windows\System32\sCbdSKd.exe2⤵PID:11176
-
-
C:\Windows\System32\dpCrLui.exeC:\Windows\System32\dpCrLui.exe2⤵PID:11208
-
-
C:\Windows\System32\QoRJgcX.exeC:\Windows\System32\QoRJgcX.exe2⤵PID:11244
-
-
C:\Windows\System32\UoWsbIU.exeC:\Windows\System32\UoWsbIU.exe2⤵PID:11260
-
-
C:\Windows\System32\SEnOTqT.exeC:\Windows\System32\SEnOTqT.exe2⤵PID:10304
-
-
C:\Windows\System32\vdBuSoz.exeC:\Windows\System32\vdBuSoz.exe2⤵PID:10352
-
-
C:\Windows\System32\Dmnbuuz.exeC:\Windows\System32\Dmnbuuz.exe2⤵PID:4304
-
-
C:\Windows\System32\xwuGRRA.exeC:\Windows\System32\xwuGRRA.exe2⤵PID:10460
-
-
C:\Windows\System32\IfVWLRn.exeC:\Windows\System32\IfVWLRn.exe2⤵PID:10556
-
-
C:\Windows\System32\MOyYhTE.exeC:\Windows\System32\MOyYhTE.exe2⤵PID:10620
-
-
C:\Windows\System32\AJXmOzW.exeC:\Windows\System32\AJXmOzW.exe2⤵PID:10664
-
-
C:\Windows\System32\PMDpZDd.exeC:\Windows\System32\PMDpZDd.exe2⤵PID:3304
-
-
C:\Windows\System32\mxXaDEK.exeC:\Windows\System32\mxXaDEK.exe2⤵PID:10784
-
-
C:\Windows\System32\PCLFKEq.exeC:\Windows\System32\PCLFKEq.exe2⤵PID:10820
-
-
C:\Windows\System32\fCSiABh.exeC:\Windows\System32\fCSiABh.exe2⤵PID:10908
-
-
C:\Windows\System32\wcXiGwT.exeC:\Windows\System32\wcXiGwT.exe2⤵PID:10948
-
-
C:\Windows\System32\RXyTxEl.exeC:\Windows\System32\RXyTxEl.exe2⤵PID:11044
-
-
C:\Windows\System32\JztbDIN.exeC:\Windows\System32\JztbDIN.exe2⤵PID:11104
-
-
C:\Windows\System32\tMORdBT.exeC:\Windows\System32\tMORdBT.exe2⤵PID:11156
-
-
C:\Windows\System32\KDcpDvw.exeC:\Windows\System32\KDcpDvw.exe2⤵PID:11200
-
-
C:\Windows\System32\fZoCGaE.exeC:\Windows\System32\fZoCGaE.exe2⤵PID:10280
-
-
C:\Windows\System32\xtNMIyh.exeC:\Windows\System32\xtNMIyh.exe2⤵PID:10408
-
-
C:\Windows\System32\lkCxHfs.exeC:\Windows\System32\lkCxHfs.exe2⤵PID:10580
-
-
C:\Windows\System32\pRRJvpQ.exeC:\Windows\System32\pRRJvpQ.exe2⤵PID:10724
-
-
C:\Windows\System32\OVOdihP.exeC:\Windows\System32\OVOdihP.exe2⤵PID:1124
-
-
C:\Windows\System32\TCXCpLs.exeC:\Windows\System32\TCXCpLs.exe2⤵PID:11060
-
-
C:\Windows\System32\vFDnqID.exeC:\Windows\System32\vFDnqID.exe2⤵PID:11160
-
-
C:\Windows\System32\fCflJpS.exeC:\Windows\System32\fCflJpS.exe2⤵PID:11256
-
-
C:\Windows\System32\lOveoXY.exeC:\Windows\System32\lOveoXY.exe2⤵PID:10508
-
-
C:\Windows\System32\FfxLaPv.exeC:\Windows\System32\FfxLaPv.exe2⤵PID:11004
-
-
C:\Windows\System32\pWMnNND.exeC:\Windows\System32\pWMnNND.exe2⤵PID:10440
-
-
C:\Windows\System32\qBDdmLv.exeC:\Windows\System32\qBDdmLv.exe2⤵PID:10792
-
-
C:\Windows\System32\TbeHkUu.exeC:\Windows\System32\TbeHkUu.exe2⤵PID:3468
-
-
C:\Windows\System32\xoMGcwV.exeC:\Windows\System32\xoMGcwV.exe2⤵PID:11284
-
-
C:\Windows\System32\KXlJdvc.exeC:\Windows\System32\KXlJdvc.exe2⤵PID:11312
-
-
C:\Windows\System32\nhbLuEm.exeC:\Windows\System32\nhbLuEm.exe2⤵PID:11336
-
-
C:\Windows\System32\GdgPILi.exeC:\Windows\System32\GdgPILi.exe2⤵PID:11368
-
-
C:\Windows\System32\Rhvgvrj.exeC:\Windows\System32\Rhvgvrj.exe2⤵PID:11396
-
-
C:\Windows\System32\RHDjEfa.exeC:\Windows\System32\RHDjEfa.exe2⤵PID:11428
-
-
C:\Windows\System32\otWRrUd.exeC:\Windows\System32\otWRrUd.exe2⤵PID:11456
-
-
C:\Windows\System32\TQBIKxH.exeC:\Windows\System32\TQBIKxH.exe2⤵PID:11484
-
-
C:\Windows\System32\rDaLXaA.exeC:\Windows\System32\rDaLXaA.exe2⤵PID:11500
-
-
C:\Windows\System32\ybJwwHb.exeC:\Windows\System32\ybJwwHb.exe2⤵PID:11540
-
-
C:\Windows\System32\WHkUjkr.exeC:\Windows\System32\WHkUjkr.exe2⤵PID:11560
-
-
C:\Windows\System32\dwDfaot.exeC:\Windows\System32\dwDfaot.exe2⤵PID:11596
-
-
C:\Windows\System32\kwvwSyB.exeC:\Windows\System32\kwvwSyB.exe2⤵PID:11624
-
-
C:\Windows\System32\JOWCxcf.exeC:\Windows\System32\JOWCxcf.exe2⤵PID:11644
-
-
C:\Windows\System32\ICCFxyx.exeC:\Windows\System32\ICCFxyx.exe2⤵PID:11680
-
-
C:\Windows\System32\TQuaPhT.exeC:\Windows\System32\TQuaPhT.exe2⤵PID:11708
-
-
C:\Windows\System32\ALDzldb.exeC:\Windows\System32\ALDzldb.exe2⤵PID:11736
-
-
C:\Windows\System32\YxdlQDP.exeC:\Windows\System32\YxdlQDP.exe2⤵PID:11768
-
-
C:\Windows\System32\HuraBVX.exeC:\Windows\System32\HuraBVX.exe2⤵PID:11792
-
-
C:\Windows\System32\VHyIqJJ.exeC:\Windows\System32\VHyIqJJ.exe2⤵PID:11824
-
-
C:\Windows\System32\EvNrjSH.exeC:\Windows\System32\EvNrjSH.exe2⤵PID:11852
-
-
C:\Windows\System32\fvOOjmC.exeC:\Windows\System32\fvOOjmC.exe2⤵PID:11868
-
-
C:\Windows\System32\KFWaRnS.exeC:\Windows\System32\KFWaRnS.exe2⤵PID:11908
-
-
C:\Windows\System32\InSWIim.exeC:\Windows\System32\InSWIim.exe2⤵PID:11936
-
-
C:\Windows\System32\IBRXEOj.exeC:\Windows\System32\IBRXEOj.exe2⤵PID:11952
-
-
C:\Windows\System32\xFWMwHe.exeC:\Windows\System32\xFWMwHe.exe2⤵PID:12000
-
-
C:\Windows\System32\XoQSdWX.exeC:\Windows\System32\XoQSdWX.exe2⤵PID:12020
-
-
C:\Windows\System32\rjPYcJq.exeC:\Windows\System32\rjPYcJq.exe2⤵PID:12048
-
-
C:\Windows\System32\chuxOqH.exeC:\Windows\System32\chuxOqH.exe2⤵PID:12076
-
-
C:\Windows\System32\mScGvlk.exeC:\Windows\System32\mScGvlk.exe2⤵PID:12092
-
-
C:\Windows\System32\ZSbUGEt.exeC:\Windows\System32\ZSbUGEt.exe2⤵PID:12132
-
-
C:\Windows\System32\feDDtMv.exeC:\Windows\System32\feDDtMv.exe2⤵PID:12152
-
-
C:\Windows\System32\iFEiWSh.exeC:\Windows\System32\iFEiWSh.exe2⤵PID:12184
-
-
C:\Windows\System32\HfDZDrM.exeC:\Windows\System32\HfDZDrM.exe2⤵PID:12208
-
-
C:\Windows\System32\WIZmphH.exeC:\Windows\System32\WIZmphH.exe2⤵PID:12244
-
-
C:\Windows\System32\gJzvyAf.exeC:\Windows\System32\gJzvyAf.exe2⤵PID:12272
-
-
C:\Windows\System32\ogqZvBy.exeC:\Windows\System32\ogqZvBy.exe2⤵PID:11268
-
-
C:\Windows\System32\IFPWKgv.exeC:\Windows\System32\IFPWKgv.exe2⤵PID:11320
-
-
C:\Windows\System32\NeQkOIM.exeC:\Windows\System32\NeQkOIM.exe2⤵PID:11388
-
-
C:\Windows\System32\ieoSeGU.exeC:\Windows\System32\ieoSeGU.exe2⤵PID:11412
-
-
C:\Windows\System32\aYeGRMw.exeC:\Windows\System32\aYeGRMw.exe2⤵PID:11492
-
-
C:\Windows\System32\EiaOvyr.exeC:\Windows\System32\EiaOvyr.exe2⤵PID:1344
-
-
C:\Windows\System32\nEIsyQF.exeC:\Windows\System32\nEIsyQF.exe2⤵PID:11668
-
-
C:\Windows\System32\VhNsNid.exeC:\Windows\System32\VhNsNid.exe2⤵PID:11724
-
-
C:\Windows\System32\cmQEdhz.exeC:\Windows\System32\cmQEdhz.exe2⤵PID:11780
-
-
C:\Windows\System32\snIltZp.exeC:\Windows\System32\snIltZp.exe2⤵PID:11836
-
-
C:\Windows\System32\bmlhujq.exeC:\Windows\System32\bmlhujq.exe2⤵PID:11916
-
-
C:\Windows\System32\odWlqEm.exeC:\Windows\System32\odWlqEm.exe2⤵PID:11964
-
-
C:\Windows\System32\wANyGOU.exeC:\Windows\System32\wANyGOU.exe2⤵PID:12060
-
-
C:\Windows\System32\nccKify.exeC:\Windows\System32\nccKify.exe2⤵PID:12124
-
-
C:\Windows\System32\iUCYRLo.exeC:\Windows\System32\iUCYRLo.exe2⤵PID:2324
-
-
C:\Windows\System32\cPhLOyh.exeC:\Windows\System32\cPhLOyh.exe2⤵PID:12192
-
-
C:\Windows\System32\lOtYjIm.exeC:\Windows\System32\lOtYjIm.exe2⤵PID:12264
-
-
C:\Windows\System32\HIzAjeY.exeC:\Windows\System32\HIzAjeY.exe2⤵PID:11356
-
-
C:\Windows\System32\kUrwqBn.exeC:\Windows\System32\kUrwqBn.exe2⤵PID:392
-
-
C:\Windows\System32\jNUxefx.exeC:\Windows\System32\jNUxefx.exe2⤵PID:4632
-
-
C:\Windows\System32\JfzSgYz.exeC:\Windows\System32\JfzSgYz.exe2⤵PID:11520
-
-
C:\Windows\System32\wJLwePA.exeC:\Windows\System32\wJLwePA.exe2⤵PID:11692
-
-
C:\Windows\System32\LhXrXGf.exeC:\Windows\System32\LhXrXGf.exe2⤵PID:11816
-
-
C:\Windows\System32\acntCqT.exeC:\Windows\System32\acntCqT.exe2⤵PID:12036
-
-
C:\Windows\System32\MbQCqEO.exeC:\Windows\System32\MbQCqEO.exe2⤵PID:536
-
-
C:\Windows\System32\XxAjqIc.exeC:\Windows\System32\XxAjqIc.exe2⤵PID:12256
-
-
C:\Windows\System32\xCxJuZg.exeC:\Windows\System32\xCxJuZg.exe2⤵PID:11404
-
-
C:\Windows\System32\gIMMpQM.exeC:\Windows\System32\gIMMpQM.exe2⤵PID:11476
-
-
C:\Windows\System32\mwrnYdK.exeC:\Windows\System32\mwrnYdK.exe2⤵PID:11580
-
-
C:\Windows\System32\mOYpVls.exeC:\Windows\System32\mOYpVls.exe2⤵PID:12140
-
-
C:\Windows\System32\vfliHox.exeC:\Windows\System32\vfliHox.exe2⤵PID:11568
-
-
C:\Windows\System32\ODpkesq.exeC:\Windows\System32\ODpkesq.exe2⤵PID:1864
-
-
C:\Windows\System32\HeazTpc.exeC:\Windows\System32\HeazTpc.exe2⤵PID:12340
-
-
C:\Windows\System32\fWcseJL.exeC:\Windows\System32\fWcseJL.exe2⤵PID:12356
-
-
C:\Windows\System32\dnuKSEk.exeC:\Windows\System32\dnuKSEk.exe2⤵PID:12380
-
-
C:\Windows\System32\NCMNFeE.exeC:\Windows\System32\NCMNFeE.exe2⤵PID:12400
-
-
C:\Windows\System32\yZQYeSg.exeC:\Windows\System32\yZQYeSg.exe2⤵PID:12444
-
-
C:\Windows\System32\GzkpNHO.exeC:\Windows\System32\GzkpNHO.exe2⤵PID:12472
-
-
C:\Windows\System32\jqORiaU.exeC:\Windows\System32\jqORiaU.exe2⤵PID:12500
-
-
C:\Windows\System32\UoGvFnt.exeC:\Windows\System32\UoGvFnt.exe2⤵PID:12528
-
-
C:\Windows\System32\oWEAdmc.exeC:\Windows\System32\oWEAdmc.exe2⤵PID:12556
-
-
C:\Windows\System32\bFCsFHf.exeC:\Windows\System32\bFCsFHf.exe2⤵PID:12584
-
-
C:\Windows\System32\VnjZKhA.exeC:\Windows\System32\VnjZKhA.exe2⤵PID:12600
-
-
C:\Windows\System32\PGAYGbO.exeC:\Windows\System32\PGAYGbO.exe2⤵PID:12640
-
-
C:\Windows\System32\fpztJbY.exeC:\Windows\System32\fpztJbY.exe2⤵PID:12668
-
-
C:\Windows\System32\fVMBSOJ.exeC:\Windows\System32\fVMBSOJ.exe2⤵PID:12684
-
-
C:\Windows\System32\tmcNikC.exeC:\Windows\System32\tmcNikC.exe2⤵PID:12716
-
-
C:\Windows\System32\zESKtEp.exeC:\Windows\System32\zESKtEp.exe2⤵PID:12744
-
-
C:\Windows\System32\lRoGJWy.exeC:\Windows\System32\lRoGJWy.exe2⤵PID:12776
-
-
C:\Windows\System32\ZDfPISm.exeC:\Windows\System32\ZDfPISm.exe2⤵PID:12808
-
-
C:\Windows\System32\TVuACST.exeC:\Windows\System32\TVuACST.exe2⤵PID:12840
-
-
C:\Windows\System32\ciIXYQo.exeC:\Windows\System32\ciIXYQo.exe2⤵PID:12868
-
-
C:\Windows\System32\sTggaSx.exeC:\Windows\System32\sTggaSx.exe2⤵PID:12884
-
-
C:\Windows\System32\tUKTUmH.exeC:\Windows\System32\tUKTUmH.exe2⤵PID:12912
-
-
C:\Windows\System32\vCFGFDe.exeC:\Windows\System32\vCFGFDe.exe2⤵PID:12952
-
-
C:\Windows\System32\AovNetv.exeC:\Windows\System32\AovNetv.exe2⤵PID:12976
-
-
C:\Windows\System32\OshtOje.exeC:\Windows\System32\OshtOje.exe2⤵PID:12996
-
-
C:\Windows\System32\nHOSnmp.exeC:\Windows\System32\nHOSnmp.exe2⤵PID:13032
-
-
C:\Windows\System32\fhhtqWk.exeC:\Windows\System32\fhhtqWk.exe2⤵PID:13052
-
-
C:\Windows\System32\twevMGz.exeC:\Windows\System32\twevMGz.exe2⤵PID:13080
-
-
C:\Windows\System32\oBHGHIk.exeC:\Windows\System32\oBHGHIk.exe2⤵PID:13104
-
-
C:\Windows\System32\YuARVXK.exeC:\Windows\System32\YuARVXK.exe2⤵PID:13148
-
-
C:\Windows\System32\UnqtMMO.exeC:\Windows\System32\UnqtMMO.exe2⤵PID:13176
-
-
C:\Windows\System32\nhzQPfT.exeC:\Windows\System32\nhzQPfT.exe2⤵PID:13204
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:12700 -
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2148
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:1276
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5428
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:7860
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3704
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SendNotifyMessage
PID:3432
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1600
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5728
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:6476
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:5624
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5960
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:8940
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:6220
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6432
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:5844
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:11068
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:10284
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
PID:11732
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:12260
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3276
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:548
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:13220
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:7780
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:8036
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5748
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2480
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:9932
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:8892
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5204
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5552
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:10928
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:8652
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:7020
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:12844
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4184
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:10328
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2880
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:1636
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:8184
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3880
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2568
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:428
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7836
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4072
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:8856
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:9004
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:9144
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:9524
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:10352
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:7360
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:11324
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:12256
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6168
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5560
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6296
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:9968
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2460
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6612
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:10716
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:12772
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:12280
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:7520
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:7468
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7620
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\U23Z080G\microsoft.windows[1].xml
Filesize97B
MD5292a283bdecf4cd89c3ad863a28bc72f
SHA118e896fec5f8b3ea2963d0a5cb45a244050c35c1
SHA25609794c6006f357000111d7d13c1c20075eaea58f68df78e118d14b4547835ec2
SHA51271349774dcf41cd9e72c881cd374ffaf2527b2156a616cc064f10f34e7bbf0ea6174916acb2b8b06428f2b2f29315359e66dde317965463ea1eb70fef52beaaa
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596934587638178.txt
Filesize75KB
MD579ea60e4feeffe4483ba2d0ea61852fb
SHA17d5921a1b6240cc717ad4f4478bbcfc42f3af8e8
SHA2561e85f6cd486b20682b1a6af9f34e7993a558f3b5dccd1e80a55178847e794923
SHA5124d0866c2b63af9570fa20bca628a6e67b3704d7ab5a8a1311fb614f38b54444cc6630390092282f075751cae38000a17e4bf1cb992a8900b0c72965c0b24dbf4
-
Filesize
3.0MB
MD503cf22e9d48c708514dc51089788b7ee
SHA107262c162d8e0c8c9f174c0cb5fdb95757877b45
SHA25663edfbf0eeb6571b613cf616af5e758d3652fc693f2fa16a5bb37a6aff87ac22
SHA512f001f62fca879e3fa60f27bc120212717177c434ef6d8ebb2aa5aabbf11ea6b390047dae37daab9c5d014a64cc328144aec0a4da4ec4ee54cbc9726ec2fff4f1
-
Filesize
3.0MB
MD5f519bfa98f12084058837414eafbe4b0
SHA1f5a9e14c60a2555e1513438bb91a662a06f3ab55
SHA256657746b0f99690abbcc2570c529b63012b61e4103dc021a8fbce48ded1e0b764
SHA51213ce1394db5d0f2f20aff51d92368d7718ce39bc93f22723f68dea2e7848c1da26f3d9e19dd50dff9052e2a9b063c98831195bbbeb6fe87ce27fa469ef5c25bf
-
Filesize
3.0MB
MD54127ec4c7be2ec1f79fb6cf56dab7288
SHA1b62d19c3f1bceb62429a8f5fff6a433eed4edfe5
SHA256a8379f4ecddd02b9a60af895f34d7b609bf9d145633a4fc558dd60301e1c61c6
SHA51280136912c12ee87c57a8686f1c48b33038be6c075ce14e13e1c267734db965f2ba05f723ec09efed54d03cc9c54cb70415c03cabea3c8eb13145ae3a2e990bb3
-
Filesize
3.0MB
MD5e3f61cb7ca8d7d0f5e861ecde42720e3
SHA1e54c314ab08326dc938a6b52dfddea1ee2e4cfde
SHA25678e9f3aad51edbeebefcd09829f34aaa09604edca05b361b03c8d5e48d99d573
SHA512b7eb9d05fabd579c0fd6cc7929066abf6a1e8bc5786290e57e2f064268c0cd2f3a7cadcf6661f57d1597cef55d21abf8322462c9a0e0e4fdb77b8802764e8569
-
Filesize
3.0MB
MD52e11f0ccec90740efac90b0c0121299c
SHA12399535bb7965a015fafa99836f122bb26ab5866
SHA2569be2c571a5f5193d0b4aea7c278fca124c97bbe249e199cc7ba2ee37a4025d25
SHA512b8b8d80937b007edfd561208eca0f18ffa135036ca5b13e5ab1ad49b8b125691ff78c45dc26d04468f0e928ba5e04c8f077c33fe6c0077d1f77cb533b56fa5fd
-
Filesize
3.0MB
MD532a774143ef6e847276030829dd72d07
SHA1ced54ccb7d7bf0c9336ec32e02dee764974bc078
SHA256352a531137f706ab91c54d3e10c6bc15c5b03c5a3db3bdc7eb6440b48c56d32b
SHA512cdf3a96b52a4208ebd69613b8df9ab13d3ab30691b33a96484145b3c4b016a2c8273cd90d7d80fa52ef2362cc44d199458764b617c7f32cca485cf7a8747d5da
-
Filesize
3.0MB
MD56832e06d6f80f62e792db0779c5a7f80
SHA192a99e630c5cc8e01ce925644be016a9fb736746
SHA25642dd642938e60f889b88939119018a506666833095d2884f99d93ea603a2f17a
SHA512ab07701b6de918f678a372336f02f2b7e67e44c4f55cff016564961ddcee94028d7aa772a7f8d82592aa9e5d479d4356fd68accd7ab9cfa95947b3ef22fa1378
-
Filesize
3.0MB
MD58d3ad797e9b6b92d35374352f03ce7e9
SHA19b722b8ca989016ebed416d17c077005362b1c21
SHA25602d8ee49241d1d462eae0462b9b4567f3745dbbb4b616ee32f08fb9ee3682f82
SHA5124ff663de4578e56e111c67d14701d187413ad08666b240f4f5ca409ba8e9874a9bedf631b1a683c9562ca1d5cc6969db8dc621bd7941586fa810a7f222a1f4aa
-
Filesize
3.0MB
MD51dd914916d569e0ed21361641ba39906
SHA1488a19e0c7ac680df384f520d326ee6e0965bfc8
SHA256f2a85f6f4138c97f1144ad643b46500f3593cc1bcdf06b78b0e6f1d3011ffd81
SHA512bda18b15a460e0e9d023016bfe4f1248af9b095bd8fb2f8765b7103be949b4740bd444f16598e104fce5e984c3c3eb23d9f16e3829ce60773a5efdc697a06616
-
Filesize
3.0MB
MD54698639cc01a35f87e3659df71db377b
SHA1365702d57d38f443fc59c5fe27f3366b591a1956
SHA256163900584ae2bb7a99673712478cda9b8b09706e7f581f882d377a4c38cc1608
SHA512d4938129f3fa75a7b88ff2e357cb0543b50a5735fc594959c5c45af34b8c2d563dba009394a8804fdce12e96b3419271e81d98fbf611c4b9e122fca34cf5cd3c
-
Filesize
3.0MB
MD533be964e3ffe8c71fcc72fa26b527440
SHA168e579b1d8edda708830a3d2cf265e939959a861
SHA256dc9078a8c4f79f72e5306bf20ac8c2d56c9b126f1af6f38d69de72d4849e6628
SHA5125ab565c05095850f44987589051c8078de95fe6be53e01a2a4855199eeb0f68db776c1df1f0f1b1c64e0205da89b3e8c77a1cc12411d2153e891b91ee0d140cd
-
Filesize
3.0MB
MD5de16ba1978348b45b73e967a536bc089
SHA1bdd77f89279fe55b116fa487e6c3fcb49d1e0ee2
SHA25646b913ed097f3ed38505230b6545e5818c172aafc3b8fce87575a785b58bcde6
SHA512984cd372003d85dab7a603c2b0b0204fb66033361e30c806e0a6ca15dd600acc3fe8e6ce617830757289a455561314df2f6c7601e5112170f276a5544e3aa316
-
Filesize
3.0MB
MD50b08fa4d85e495bcf9e2a946d3532085
SHA1f6bfa1716b34002b18f3ebbc85ad6cf709af2cb5
SHA2565a32bd9bc3c32dae24c71d9bf1626e0437b6e6c63173c7711c530c1502938ba4
SHA5125e5aaf17f957fc4d11535840cd2493258da5e1130a0f861c992d025c2852abd19e233e51cf25df039e12b977aecff0c0c12b4ffde9f758def3807ad76579fa2c
-
Filesize
3.0MB
MD5d973fe1841adb1a2d984079bfbf0230d
SHA15a4e967c5c5d13710cd3ab93fa0d36fb82feb73d
SHA256f1aa9bccdfe7367a0840411cc67c5abdab04e45531c78e3bd902184d0ca5f468
SHA51235a47aeeba5459a01ccff64b1fefed769426c5728a6088414b7e62b4117ac1c012c1b5d8321ed1383cf02c004390a88449af4b7d5cadebdbf4d7585f8af8c4ba
-
Filesize
3.0MB
MD550f69cd580f3c6d729df5813486cd9c6
SHA194108fa6d2cc719240f21981da76ad2d05f18299
SHA2566fc7d5e7d0ea704f6efe19e49d006a30f98c1114f7fc3f1ff2c3d3a9e4ec6226
SHA512e71dc0c32259a0602cfc6f1a8b652245dc1db94b75f3ddbee7f22267d910f1d6c162c449f7d3fc10bc8230c28be7125f5b85f5b15543fb9de98494671b885e9f
-
Filesize
3.0MB
MD5bd45b1ca128ce63cca40e959a0f2b70e
SHA1d4e4248a6d1fd7387e3916b65186f1486a32b87b
SHA256feb2b57ce8ef113c274b22fd4a406ace7ee000962c2c5952a08b3cc765cb6a65
SHA512a42d15801d7851ae22173105c971ce9616667af4a2a4e7dbee72cdca0b3021aa7a0c81621757a2752f91370dec44e2f416d3458f3adf825445ba8c3a241b7fc8
-
Filesize
3.0MB
MD5a212cec9aabf11d2fd4df12e4edb9bc5
SHA1d7f3d376ccd8a291d345c73bb6f6deb9c0c2b5d8
SHA2567e898856a2d2b825807b51639c6896d59fc5b4b5e3abf719df1e8f19025a0ece
SHA5129d5ae0d5f354e3fd70aa67c06467b0aa8af9cd2f09a7eb520a576d32a33c44c88ebbbc7ac5824b640a56e41d910e47aca80d0262b773e822655c1be3cd723b4f
-
Filesize
3.0MB
MD5756da7c1f23ee1be286db8efdc1e684e
SHA1319da8e64d5c9a2f157f5ac69a3596f5e6ad9789
SHA2566b05cc0fe2aa2053329c69f94d2081df604be78514ddbfc6cc9499b0e164bf44
SHA512c9c17e46d648af0bba469bde7a583d00c843b554768a4f3ce04a8c8f9436c9c59b76f63c6b10b00c9952c2e7ee5f3acf1ba32a049fde9b32981a34b059333868
-
Filesize
3.0MB
MD5df3bdf95251f8399f618e863ca4468dd
SHA1d96692aedb33036a5e15ba4b4dde1e54f9c5232d
SHA25616213c8ce7f11e8c28408b4ba18676bbf40450bee4d6f4ad5d60da39c363c888
SHA5129ef4604b07cb5de754b03b3fe46e625757fe48e24709474991f2a8d7ab1133318a72f683052833360b0f2764ec221174a04ef1a76d076396933e9a00b80551d5
-
Filesize
3.0MB
MD53e4b0d5a24e2f98f7ed32ce47d721a58
SHA10a1674fbb13f7db10907212e938611a8864aa2ef
SHA25663a20ab75e418503170ec910802677fe5c4ab190e53dafe5b30172e215326ca4
SHA512dcf9b6b17f4f4a1a23b8ec158b763fcbdfd57e85f43db6d1376e38acc720ec20e1b1603ff6a3474bcab919719fa0244a18b65228ab7f76cd0dee4a37df3daec7
-
Filesize
3.0MB
MD5d696229b1c14f55e9e7e211897efe38b
SHA1d8a11625faa0e10058e83764498794718f7f3f57
SHA256ed3b10b7871408811b5a3bcfa6d07d41a5ed1e8160ab4fa70edeefe25208b9d6
SHA5123f66500e40b44275eb804a8fd2309619a857cbfdd7606397f180414e8750c84d209b504aba19c28e86be38f46a6a7297d8c6fc53533436fb5ebd44bb18190942
-
Filesize
3.0MB
MD569799832a6ffcd134eb4217835c8de67
SHA1b9cdccdd1eeb89e16fdcb1188e3c7a67e36d62d7
SHA256080f0233362ceeac511b6e2d6010a6a63398deb0582c2183cf6854028f5cf74f
SHA5122b7f68b6802719ea88e5880b5c702be4fec14c9159faf2e668ec1625fb36a5c982698619885bed59933b69cb24544786d05d06da783b51f765641731bece4ff6
-
Filesize
3.0MB
MD575fd298d8b0eaa99a35128b15c841e4d
SHA1c72ee360c13557cb4d9bacb2117737b413082b56
SHA25665ee76d14e829ba9f243a73684e3a09746a4cfbced8371ca490f2d9fb51f78ef
SHA512beaf2cac3b0a9e3d830c1b0f196d834c4816fe3bd4d9b94eb70a1c19688d1837947b759cec4e6d1034e7fd568ef6dbb8caf37f7c499c358f0100d7ce93ca4cec
-
Filesize
3.0MB
MD5450e53b1a9bd57c861797cbf1fe64103
SHA1a10ebe9ab1e9ca2a0d5cd84a76174f7877f415d1
SHA256f05339a071e93829e0d431e60fb9ca54f45cbb062937fa4969709bf158a8d212
SHA51245e072ccf0e93db5075edd29fbe70c5e6b33ec1c070ce8bf75ded8e7815f14c8041c4cb7a8856842141cee37142504ffc6d02bb6275df1d24e42fad49cee4367
-
Filesize
3.0MB
MD543060c7f3cd14013a61f2e2e048c1459
SHA167b6e1f4b5bf8715e0512b3d4879fac09f15f926
SHA25606b010fbb8e5871b841fa824d272731ae704c230eb8e6da93f117a062a5d6e62
SHA5128d14220590bcd338703c60e6355de9a8a972be80904a6166b4550da77574463616b25c659dee6114f4038ff052e15ff51ca907ec8295665638c999cfdfdabf4d
-
Filesize
3.0MB
MD5deee2b5a290d874406e65b360ed685ba
SHA184c3c2628b134ddc2368b8cfb6c5db9985c567f0
SHA256d0304567a260e08a14d8400e7320478655402ccee1ec04b1b78c8de806b3fb71
SHA512b2c51cf801526813f52f7b111263a5cb19cb76ae9f4b6972d042185a94ab64edd0ec4068fc0a4c7798d12703feaa2e4f1d6a2e9aca2d336c4096e1bcebf509e4
-
Filesize
3.0MB
MD5b51b1635be40131a39c8f29ed2649963
SHA15552f3e3471ccaf1975763d5f3dd4d3d72d7cd53
SHA25693625c11064a2a745e83eaae5d29b9b99459911a157caa1354f3f59def9923ba
SHA512c00ea104ef17d80488db875929af16441c38fe20d4ab6f418133abd12465a1645affd38ccb2659c4808f58d27fcde55ebf4e077b0d4146dd9611e0131a959fbf
-
Filesize
3.0MB
MD584db5e57ea85d63d559360cc017afdd8
SHA1661aa2ceab56f876a3733f1c2a65500430c0a2ea
SHA25623a6446c7692ce05ef797d807fa116a200fff63dc97f6fb7474ae2ee6031cd0c
SHA512f8a111349f9545f8c54e0d4358fe0b1bdc1794140c1019835b6ffc00f752dc03debc4cda3a73fca191c09f92349d0c05969c66d2370d42e16277635967b097cf
-
Filesize
3.0MB
MD56b84edbb6f5baf3ba454358ee51e6fa0
SHA19cef747e36a91e851c1e858812920bbb6c2859cf
SHA256fedd63cffce15ab874ad9541892c3789c0ecc89fcc1b064feb0fc2da0c5e3345
SHA512df895f1990b128fccbf2fc5a425d4161a41279e29422e54718d5d6a89bf45f8f375482564145a00dea5dc9592d9b1f06298f3e9ac7f89f801d1c2cac520a1e23
-
Filesize
3.0MB
MD563eacbfd2e7637d2217893386ddb11de
SHA1d8517f7b82324beec4da01d3877f23b9ac4c5ba5
SHA256f3b8127a6daddc46a1bf1a82db50fce1422a46534aec142aacd6e5ee96a20915
SHA512236de07f92fca47332d5abc2d557f35815b88b9b68fa58f9e226f1d8f6d0e6a09cb8ee1fb1bd509f2bdc784c62c3b79db192c3bafd45ded0c36f2ccec8849df7
-
Filesize
3.0MB
MD5891ec552940ef14771e9c83f906ac880
SHA1059ef900b7db71622003a27bf9f15d6f5bc990e0
SHA256a556cc1cf6cd442bb3b372b452f13703fb0bc835cb702764a2e1f59ee070308a
SHA512fac1682ab52268c1f84717d328b0a750fc455c3b4bec4fa1b458fc0bd5f01e79b9cb9f8249f0edb2eb6d22677b0a043edcf467a861a6697f4df3ae905fd6f9cf
-
Filesize
3.0MB
MD5738aae18b04b411aa68a4b9f4d9ac926
SHA1ad3e6a8455b9edfcb2bad4c0bec04b082485d74e
SHA2562394d6baa88a42b442ea78b7af59768539ff1e7e6302b3a068d150d5ff81d8fc
SHA5129997f389b29ca5dd62f1f9d3b0a072127cd9885298fec85e2b24501c42bf890072bba09145eb30b8485699c1ae5753023b4b0427edb289b37abd92b2e547f399
-
Filesize
3.0MB
MD545b87bcc13d868a635ef172f3f4d72bf
SHA1fec9c073171b8d92a5c3450ee3fbbc8615ca7bc9
SHA256094a27378bf28ce23bdb21dea59997cc4e0a6fae82d2539951d2a5a022ea4b1d
SHA5127550ef424f99770d6c0c4b163e6cc542ffc9cd8a3d4515f5a2fdfd58edb810210cfadd2ee568c6bfb75009f0d6ce4f3e6d2f47f50ac5f71b73552beeb4933617