Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 23:07
Static task
static1
Behavioral task
behavioral1
Sample
07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe
-
Size
62KB
-
MD5
07cc657dc4216a6185d8f20dea6e0f37
-
SHA1
84ca2e56562bcfa5afbb21e868a5404863f206d2
-
SHA256
6e8a28115b0f36155aee7dee44e61ca9278cff3993f10fdfe0f328f5c7f7e3ea
-
SHA512
89a3ccd13da99cf8ce301cdd0478cad764cd940cf5e6393ebc109a00ea3aa32e9a86e50d94a1c822cbfff78d2b00d89ca652865394b144bbf131e60bda3d3de4
-
SSDEEP
1536:3MivkKldcHkM5g1In7dMO3TpZBK0t4KDFP14FMV:3MivkK1M58IBLSUP16M
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3708 Tgtkttyzjg.exe 3872 Tgtkttyzjg.exe 2248 Tgtkttyzjg.exe 4652 Tgtkttyzjg.exe 3612 Tgtkttyzjg.exe 2104 Tgtkttyzjg.exe 3312 Tgtkttyzjg.exe 3976 Tgtkttyzjg.exe 408 Tgtkttyzjg.exe 1880 Tgtkttyzjg.exe 2008 Tgtkttyzjg.exe 1076 Tgtkttyzjg.exe 3944 Tgtkttyzjg.exe 2764 Tgtkttyzjg.exe 1544 Tgtkttyzjg.exe 3116 Tgtkttyzjg.exe 1084 Tgtkttyzjg.exe 1092 Tgtkttyzjg.exe 1972 Tgtkttyzjg.exe 3720 Tgtkttyzjg.exe 1952 Tgtkttyzjg.exe 1316 Tgtkttyzjg.exe 1312 Tgtkttyzjg.exe 2736 Tgtkttyzjg.exe 3968 Tgtkttyzjg.exe 2320 Tgtkttyzjg.exe 4864 Tgtkttyzjg.exe 3768 Tgtkttyzjg.exe 2968 Tgtkttyzjg.exe 972 Tgtkttyzjg.exe 1352 Tgtkttyzjg.exe 5100 Tgtkttyzjg.exe 4076 Tgtkttyzjg.exe 2496 Tgtkttyzjg.exe 1112 Tgtkttyzjg.exe 1040 Tgtkttyzjg.exe 3320 Tgtkttyzjg.exe 4388 Tgtkttyzjg.exe 1416 Tgtkttyzjg.exe 3816 Tgtkttyzjg.exe 1088 Tgtkttyzjg.exe 3728 Tgtkttyzjg.exe 2652 Tgtkttyzjg.exe 3524 Tgtkttyzjg.exe 3280 Tgtkttyzjg.exe 1516 Tgtkttyzjg.exe 4360 Tgtkttyzjg.exe 1632 Tgtkttyzjg.exe 3308 Tgtkttyzjg.exe 1336 Tgtkttyzjg.exe 2304 Tgtkttyzjg.exe 4516 Tgtkttyzjg.exe 2952 Tgtkttyzjg.exe 2372 Tgtkttyzjg.exe 2096 Tgtkttyzjg.exe 4996 Tgtkttyzjg.exe 2112 Tgtkttyzjg.exe 3356 Tgtkttyzjg.exe 4844 Tgtkttyzjg.exe 4820 Tgtkttyzjg.exe 3708 Tgtkttyzjg.exe 2292 Tgtkttyzjg.exe 1980 Tgtkttyzjg.exe 4472 Tgtkttyzjg.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qjf09efoiejglkef = "‘šˆÒ‘" 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wabudvvdya.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Wabudvvdya.exe\"먀" Tgtkttyzjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Wabudvvdya.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Wabudvvdya.exe\"먀" Tgtkttyzjg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tgtkttyzjg.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Tgtkttyzjg.exe\"먀" 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Tgtkttyzjg.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Tgtkttyzjg.exe\"" 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tgtkttyzjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tgtkttyzjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tgtkttyzjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tgtkttyzjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tgtkttyzjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tgtkttyzjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tgtkttyzjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wabudvvdya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tgtkttyzjg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4644 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 4644 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 4644 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 4644 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 4644 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 4644 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 4644 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 4644 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 3708 Tgtkttyzjg.exe 3708 Tgtkttyzjg.exe 3708 Tgtkttyzjg.exe 3708 Tgtkttyzjg.exe 3708 Tgtkttyzjg.exe 3708 Tgtkttyzjg.exe 3708 Tgtkttyzjg.exe 3708 Tgtkttyzjg.exe 3872 Tgtkttyzjg.exe 3872 Tgtkttyzjg.exe 3872 Tgtkttyzjg.exe 3872 Tgtkttyzjg.exe 3872 Tgtkttyzjg.exe 3872 Tgtkttyzjg.exe 3872 Tgtkttyzjg.exe 3872 Tgtkttyzjg.exe 2248 Tgtkttyzjg.exe 2248 Tgtkttyzjg.exe 2248 Tgtkttyzjg.exe 2248 Tgtkttyzjg.exe 2248 Tgtkttyzjg.exe 2248 Tgtkttyzjg.exe 2248 Tgtkttyzjg.exe 2248 Tgtkttyzjg.exe 4652 Tgtkttyzjg.exe 4652 Tgtkttyzjg.exe 4652 Tgtkttyzjg.exe 4652 Tgtkttyzjg.exe 4652 Tgtkttyzjg.exe 4652 Tgtkttyzjg.exe 4652 Tgtkttyzjg.exe 4652 Tgtkttyzjg.exe 3612 Tgtkttyzjg.exe 3612 Tgtkttyzjg.exe 3612 Tgtkttyzjg.exe 3612 Tgtkttyzjg.exe 3612 Tgtkttyzjg.exe 3612 Tgtkttyzjg.exe 3612 Tgtkttyzjg.exe 3612 Tgtkttyzjg.exe 2104 Tgtkttyzjg.exe 2104 Tgtkttyzjg.exe 2104 Tgtkttyzjg.exe 2104 Tgtkttyzjg.exe 2104 Tgtkttyzjg.exe 2104 Tgtkttyzjg.exe 2104 Tgtkttyzjg.exe 2104 Tgtkttyzjg.exe 3312 Tgtkttyzjg.exe 3312 Tgtkttyzjg.exe 3312 Tgtkttyzjg.exe 3312 Tgtkttyzjg.exe 3312 Tgtkttyzjg.exe 3312 Tgtkttyzjg.exe 3312 Tgtkttyzjg.exe 3312 Tgtkttyzjg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 3548 4644 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 56 PID 4644 wrote to memory of 3708 4644 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 82 PID 4644 wrote to memory of 3708 4644 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 82 PID 4644 wrote to memory of 3708 4644 07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe 82 PID 3708 wrote to memory of 3548 3708 Tgtkttyzjg.exe 56 PID 3708 wrote to memory of 3872 3708 Tgtkttyzjg.exe 83 PID 3708 wrote to memory of 3872 3708 Tgtkttyzjg.exe 83 PID 3708 wrote to memory of 3872 3708 Tgtkttyzjg.exe 83 PID 3872 wrote to memory of 3548 3872 Tgtkttyzjg.exe 56 PID 3872 wrote to memory of 2248 3872 Tgtkttyzjg.exe 84 PID 3872 wrote to memory of 2248 3872 Tgtkttyzjg.exe 84 PID 3872 wrote to memory of 2248 3872 Tgtkttyzjg.exe 84 PID 2248 wrote to memory of 3548 2248 Tgtkttyzjg.exe 56 PID 2248 wrote to memory of 4652 2248 Tgtkttyzjg.exe 85 PID 2248 wrote to memory of 4652 2248 Tgtkttyzjg.exe 85 PID 2248 wrote to memory of 4652 2248 Tgtkttyzjg.exe 85 PID 4652 wrote to memory of 3548 4652 Tgtkttyzjg.exe 56 PID 4652 wrote to memory of 3612 4652 Tgtkttyzjg.exe 86 PID 4652 wrote to memory of 3612 4652 Tgtkttyzjg.exe 86 PID 4652 wrote to memory of 3612 4652 Tgtkttyzjg.exe 86 PID 3612 wrote to memory of 3548 3612 Tgtkttyzjg.exe 56 PID 3612 wrote to memory of 2104 3612 Tgtkttyzjg.exe 87 PID 3612 wrote to memory of 2104 3612 Tgtkttyzjg.exe 87 PID 3612 wrote to memory of 2104 3612 Tgtkttyzjg.exe 87 PID 2104 wrote to memory of 3548 2104 Tgtkttyzjg.exe 56 PID 2104 wrote to memory of 3312 2104 Tgtkttyzjg.exe 88 PID 2104 wrote to memory of 3312 2104 Tgtkttyzjg.exe 88 PID 2104 wrote to memory of 3312 2104 Tgtkttyzjg.exe 88 PID 3312 wrote to memory of 3548 3312 Tgtkttyzjg.exe 56 PID 3312 wrote to memory of 3976 3312 Tgtkttyzjg.exe 89 PID 3312 wrote to memory of 3976 3312 Tgtkttyzjg.exe 89 PID 3312 wrote to memory of 3976 3312 Tgtkttyzjg.exe 89 PID 3976 wrote to memory of 3548 3976 Tgtkttyzjg.exe 56 PID 3976 wrote to memory of 408 3976 Tgtkttyzjg.exe 90 PID 3976 wrote to memory of 408 3976 Tgtkttyzjg.exe 90 PID 3976 wrote to memory of 408 3976 Tgtkttyzjg.exe 90 PID 408 wrote to memory of 3548 408 Tgtkttyzjg.exe 56 PID 408 wrote to memory of 1880 408 Tgtkttyzjg.exe 91 PID 408 wrote to memory of 1880 408 Tgtkttyzjg.exe 91 PID 408 wrote to memory of 1880 408 Tgtkttyzjg.exe 91 PID 1880 wrote to memory of 3548 1880 Tgtkttyzjg.exe 56 PID 1880 wrote to memory of 2008 1880 Tgtkttyzjg.exe 92 PID 1880 wrote to memory of 2008 1880 Tgtkttyzjg.exe 92 PID 1880 wrote to memory of 2008 1880 Tgtkttyzjg.exe 92 PID 2008 wrote to memory of 3548 2008 Tgtkttyzjg.exe 56 PID 2008 wrote to memory of 1076 2008 Tgtkttyzjg.exe 93 PID 2008 wrote to memory of 1076 2008 Tgtkttyzjg.exe 93 PID 2008 wrote to memory of 1076 2008 Tgtkttyzjg.exe 93 PID 1076 wrote to memory of 3548 1076 Tgtkttyzjg.exe 56 PID 1076 wrote to memory of 3944 1076 Tgtkttyzjg.exe 94 PID 1076 wrote to memory of 3944 1076 Tgtkttyzjg.exe 94 PID 1076 wrote to memory of 3944 1076 Tgtkttyzjg.exe 94 PID 3944 wrote to memory of 3548 3944 Tgtkttyzjg.exe 56 PID 3944 wrote to memory of 2764 3944 Tgtkttyzjg.exe 95 PID 3944 wrote to memory of 2764 3944 Tgtkttyzjg.exe 95 PID 3944 wrote to memory of 2764 3944 Tgtkttyzjg.exe 95 PID 2764 wrote to memory of 3548 2764 Tgtkttyzjg.exe 56 PID 2764 wrote to memory of 1544 2764 Tgtkttyzjg.exe 96 PID 2764 wrote to memory of 1544 2764 Tgtkttyzjg.exe 96 PID 2764 wrote to memory of 1544 2764 Tgtkttyzjg.exe 96 PID 1544 wrote to memory of 3548 1544 Tgtkttyzjg.exe 56 PID 1544 wrote to memory of 3116 1544 Tgtkttyzjg.exe 97 PID 1544 wrote to memory of 3116 1544 Tgtkttyzjg.exe 97 PID 1544 wrote to memory of 3116 1544 Tgtkttyzjg.exe 97
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2620
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2748
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07cc657dc4216a6185d8f20dea6e0f37_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"18⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"19⤵
- Executes dropped EXE
PID:1084 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"20⤵
- Executes dropped EXE
PID:1092 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"21⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"22⤵
- Executes dropped EXE
PID:3720 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"23⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1316 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"25⤵
- Executes dropped EXE
PID:1312 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"26⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"27⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"28⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"29⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"30⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"31⤵
- Executes dropped EXE
PID:2968 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"32⤵
- Executes dropped EXE
PID:972 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"33⤵
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"34⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"35⤵
- Executes dropped EXE
PID:4076 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"36⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"37⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"38⤵
- Executes dropped EXE
PID:1040 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"39⤵
- Executes dropped EXE
PID:3320 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"40⤵
- Executes dropped EXE
PID:4388 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"41⤵
- Executes dropped EXE
PID:1416 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"42⤵
- Executes dropped EXE
PID:3816 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"43⤵
- Executes dropped EXE
PID:1088 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"44⤵
- Executes dropped EXE
PID:3728 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"45⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"46⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"47⤵
- Executes dropped EXE
PID:3280 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"48⤵
- Executes dropped EXE
PID:1516 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"49⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"50⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"51⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"52⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"53⤵
- Executes dropped EXE
PID:2304 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"54⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"55⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"56⤵
- Executes dropped EXE
PID:2372 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"57⤵
- Executes dropped EXE
PID:2096 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"58⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"59⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"60⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"61⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"62⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"63⤵
- Executes dropped EXE
PID:3708 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"64⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"65⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"66⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"67⤵PID:3784
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"68⤵PID:1876
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"69⤵PID:2632
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"70⤵PID:4680
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"71⤵
- System Location Discovery: System Language Discovery
PID:532 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"72⤵PID:1788
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"73⤵PID:740
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"74⤵PID:4764
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"75⤵PID:952
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"76⤵PID:2760
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"77⤵PID:3020
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"78⤵PID:3156
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"79⤵PID:4100
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"80⤵PID:1508
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"81⤵PID:1292
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"82⤵PID:1168
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"83⤵PID:2668
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"84⤵PID:4192
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"85⤵PID:4956
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"86⤵PID:5000
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"87⤵PID:1316
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"88⤵PID:220
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"89⤵PID:3812
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"90⤵PID:1488
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"91⤵PID:4816
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"92⤵
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"93⤵PID:4576
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"94⤵PID:4508
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"95⤵PID:3224
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"96⤵
- System Location Discovery: System Language Discovery
PID:412 -
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"97⤵PID:4448
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"98⤵PID:2308
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"99⤵PID:972
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"100⤵PID:4564
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"101⤵PID:4184
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"102⤵PID:4284
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"103⤵PID:3344
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"104⤵PID:4976
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"105⤵PID:3576
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"106⤵PID:632
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"107⤵PID:4288
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"108⤵PID:4108
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"109⤵PID:5080
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"110⤵PID:3300
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"111⤵PID:2104
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"112⤵PID:4160
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"113⤵PID:3628
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"114⤵PID:2360
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"115⤵PID:1456
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"116⤵PID:1060
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"117⤵PID:436
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"118⤵PID:4180
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"119⤵PID:1100
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"120⤵PID:4144
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"121⤵PID:4736
-
C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"C:\Users\Admin\AppData\Roaming\Tgtkttyzjg.exe"122⤵PID:4672
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-